skip to content
Decrypt LOL

Get Cyber-Smart in Just 5 Minutes a Week

Decrypt delivers quick and insightful updates on cybersecurity. No spam, no data sharing—just the info you need to stay secure.

Read the latest edition
Concerns Raised Over Security of Major Web Browsers

Concerns Raised Over Security of Major Web Browsers

/ 3 min read

Quick take - Recent analyses have raised concerns about the security of major web browsers, highlighting vulnerabilities in the handling of sensitive data that may be exploited by local attackers, particularly regarding the persistence of this data in memory even after tabs are closed.

Fast Facts

  • Recent analyses highlight security concerns in major web browsers (Chrome, Firefox, Brave, Edge) regarding the handling of sensitive data like passwords and credit card information.
  • Vulnerabilities allow local attackers to access sensitive information stored in memory, even after tabs are closed, as indicated by Common Weakness Enumeration (CWE) 316.
  • Despite browser sandboxing, all major browsers exhibit similar vulnerabilities, enabling attackers to extract sensitive data from memory dumps using tools like PowerShell scripts.
  • Proposed mitigation strategies include encrypting data in memory, clearing sensitive information after use, and using methods like XOR encryption and the Data Protection API (DPAPI).
  • Experts recommend users close all browser windows and terminate processes after online activities to protect sensitive information from potential local attacks.

Security Concerns in Major Web Browsers

Recent analyses have raised concerns about the security of major web browsers, including Chrome, Firefox, Brave, and Edge. These concerns particularly focus on the handling of sensitive data such as passwords and credit card information. Investigations indicate that local attackers may exploit vulnerabilities in these browsers, allowing access to sensitive information retained in memory, even after users stop actively browsing or close tabs.

Understanding the Vulnerabilities

The discussion centers around Common Weakness Enumeration (CWE) 316, which highlights the risks associated with the cleartext storage of sensitive information in memory. When a browser is launched, the operating system loads its executable into memory and allocates resources. The browser process utilizes virtual memory mapped to physical RAM, where it loads configuration settings, resources, and cached data. During user interaction with web pages, input data is stored in memory as string objects, which can include sensitive information. Crucially, this sensitive data may persist in memory even after the associated tab is closed. Tests have evidenced this persistence with the retention of a password and an API key.

Exploitation and Mitigation Strategies

Although browser sandboxing is designed to isolate processes and enhance security, it does not fully prevent external access to the contents of memory. All major browsers display similar vulnerabilities concerning the storage of sensitive data in memory. A proof of concept has demonstrated that attackers can exploit these vulnerabilities to extract sensitive information from memory dumps. Tools such as PowerShell scripts and resources found on GitHub facilitate memory dumping and data extraction.

To mitigate these risks, several strategies have been proposed, including encrypting data in memory and ensuring that sensitive information is cleared after use. Two specific mitigation methods discussed are the application of XOR encryption in conjunction with non-pageable memory allocation, as well as the use of the Data Protection API (DPAPI) for encryption. The effectiveness of these methods in preventing the plaintext storage of sensitive data in memory has been noted. However, concerns remain about the practicality of developing a browser that incorporates all necessary mitigations without adversely affecting performance.

Experts recommend that users close all browser windows and terminate processes after completing their online activities. This approach is seen as a necessary step to protect sensitive information from potential local attacks.

Original Source: Read the Full Article Here

Check out what's latest