Microsoft Edge Enhances Password Security with Latest Update

| 5 min read

The recent alterations to Microsoft Edge's password management system reflect significant strides toward securing user credentials, yet they also reveal a troubling aspect of browser security practices. The announcement that Edge will no longer store plaintext passwords in memory is a crucial step in addressing previously identified vulnerabilities that exposed user data to potential threats. This change brings the one-time assertions by Microsoft into sharper focus, as they responded to criticism from security experts over the inherent risks of their previously integrated system.

Context: Microsoft Edge's Plight

At the heart of this recent overhaul is a finding by security researcher Tom Jøran Sønstebyseter Rønning, who highlighted a serious defect in how Edge managed stored passwords. Rønning's research detailed how passwords saved in Edge were decrypted by the browser at startup, lingering in plaintext within system memory regardless of whether users even interacted with the sites utilizing those credentials. In his social media posts, he illustrated how an adversary, should they gain access to an account with administrative privileges, could harvest these plaintext passwords directly from memory. This level of vulnerability raises alarms given the increasing sophistication of cyber-attacks targeting browser memory—an avenue typically viewed as secure.

Microsoft's Initial Response and Backtrack

Initially defending the status quo, Microsoft argued that accessing browser data in memory would only pose a risk if a device was already compromised. This perspective, however, hasn't sat well with the cybersecurity community, given that the principle of least privilege suggests that even minimized potential vulnerabilities can lead to significant risks. Although Microsoft’s assurances were predicated on standard risk assessment practices, they ultimately reversed course. As the Edge Security Team Lead Gareth Evans announced, Microsoft will now prevent passwords from being loaded into memory on startup, marking a pivotal change across all versions of Edge. This proactive modification is currently rolling out, with implementation underway in Edge’s Canary version and intended to reach stable releases shortly.

Comparative Security Practices Among Browsers

Edge's decision to adopt this change indicates a necessary recalibration of its approach to password security, especially when compared to its Chromium siblings. Interestingly, Rønning noted that Chrome and other Chromium-based browsers do not exhibit the same security vulnerabilities as Edge does; they only decrypt passwords at the point of use, drastically reducing risk. The revelations underline the variance in approaches within the same architecture: a timely reminder that not all implementations of the same base technology automatically align in security efficacy.

Understanding the Broader Implications

It’s here where things become a bit more nuanced. While the security flaws uncovered suggest a need for vigilance, it may also be plausible to see this incident as indicative of broader industry practices. The propensity for software to prioritize performance—as noted by Microsoft—can hamper security, reflecting an ongoing struggle between usability and safeguarding user data. Additionally, it brings into question the adequacy of existing protocols for managing passwords in a way that doesn't betray user trust.

Experts like Morey Haber, Chief Security Advisor at BeyondTrust, note that retaining passwords in plaintext memory fundamentally undermines core security principles, presenting a continuous risk. This scenario also opens the dialogue about better practices across the industry: why are certain browsers adopting secure password management while others lag behind? If there is a common architecture, shouldn’t baseline security practices be standard across all products?

Advice Going Forward

With Microsoft addressing these vulnerabilities, Edge users can feel more secure about relying on its built-in password manager. However, it’s important to question whether this should be the default stance for all users. The instinct is to rely solely on the tools provided by a browser, but that choice can lead to vulnerabilities in multi-browser environments. If you're someone that toggles between Edge, Chrome, or Firefox, relying on a dedicated password manager may still offer a greater layer of security than integrated solutions. This bifurcation in user experience highlights a critical takeaway: the browser landscape is not monolithic, and security choices must be tailored to individual use cases.

Concisely, while Microsoft has made meaningful progress with Edge's password manager, security-conscious users should continue to evaluate their options beyond the confines of their browser of choice. The incident emphasizes the ongoing need for a strong defense against potential breaches and further illustrates how rapid advancements in threat exposure necessitate vigilant adaptation by software developers.

Looking ahead, as browsers continue to evolve, the pressure on developers to harmonize usability with robust security will heighten. Users must remain informed and proactive, leveraging tools that align with their unique security requirements while pushing for better practices within the technology they use daily.

Source: Robert Rodriguez · www.zdnet.com