Incident: Security Flaw in Google Chrome Exposes Stored Passwords

Published Date: 2013-08-07

Postmortem Analysis
Timeline 1. The software failure incident where a serious flaw in the security of Google's Chrome browser allowed easy access to stored passwords happened in August 2013 as per the article published on August 7, 2013 [20748].
System The system that failed in the software failure incident described in Article 20748 is: 1. Google Chrome's password management system.
Responsible Organization 1. Google's Chrome browser development team, led by Justin Schuh, was responsible for causing the software failure incident by not addressing the serious flaw in the security of the browser that allowed easy access to stored passwords [20748].
Impacted Organization 1. Users of Google Chrome - The software failure incident impacted users of Google Chrome as their stored passwords for various sites were exposed without requiring a password to view them [20748].
Software Causes 1. The software cause of the failure incident was a serious flaw in the security of Google's Chrome browser that allowed anyone with access to a user's computer to view all the passwords stored for email, social media, and other sites directly from the settings panel without needing a password [20748].
Non-software Causes 1. Lack of a master password requirement for viewing stored passwords in Chrome [20748] 2. Decision by Google's Chrome developer team not to change the system despite the known weakness [20748]
Impacts 1. The software failure incident in Google's Chrome browser allowed anyone with access to a user's computer to view all stored passwords for email, social media, and other sites without needing a password, potentially compromising personal and sensitive company login details [20748]. 2. The incident raised concerns about the security and privacy of millions of Chrome users who may have been unknowingly saving their passwords in the browser, highlighting the ease with which passwords could be accessed and copied [20748]. 3. The failure to address the flaw in Chrome's password visibility feature led to criticism from security experts, developers, and even the British inventor of the web, Sir Tim Berners-Lee, who described the response as "disappointing" and likened the flaw to a way to access someone's passwords easily [20748]. 4. The incident also highlighted the differences in password security measures among various browsers, with Firefox adding a master password option requirement in response to a similar flaw, while Apple's Safari requires a master password before showing stored passwords [20748]. 5. The lack of a master password or similar security feature in Chrome was criticized by developers who argued that providing users with a false sense of security could lead to risky behavior and make it easier for malicious actors to access stored passwords [20748].
Preventions 1. Implementing a master password requirement for accessing stored passwords could have prevented the software failure incident. This approach was successfully adopted by Apple's Safari browser [20748]. 2. Regularly reviewing and addressing security vulnerabilities in the software to ensure that sensitive information like passwords is adequately protected [20748]. 3. Conducting thorough security testing and audits to identify and fix potential flaws in the system before they can be exploited by malicious actors [20748].
Fixes 1. Implementing a master password option requirement similar to what Firefox added in response to a similar flaw [20748]. 2. Considering supporting a master password or similar security measure to provide users with an additional layer of protection and prevent easy access to stored passwords [20748]. 3. Reevaluating the decision not to change the system and addressing the flaw in the password visibility issue to enhance user security [20748].
References 1. Justin Schuh, head of Google's Chrome developer team [20748] 2. Sir Tim Berners-Lee, British inventor of the web [20748] 3. Elliott Kember, UK-based software developer from New Zealand [20748] 4. "marcgg", a developer who criticized Google's position on security [20748] 5. A security manager at a publishing company [20748]

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization (a) The software failure incident related to the security flaw in Google's Chrome browser has similarities with previous incidents in other browsers. For example, Firefox was revealed in 2010 to use the same "plain text" storage method for passwords that Chrome is being criticized for. Firefox addressed this issue by adding a master password option requirement [20748]. (b) The incident of passwords being easily accessible due to a security flaw has not been limited to Google's Chrome browser. Some versions of Microsoft's Internet Explorer have also had similar failings in the past. Additionally, Apple's Safari requires the user to enter a master password before showing stored passwords, indicating a different approach to password security [20748].
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase can be seen in the flaw in the security of Google's Chrome browser that allowed anyone with access to a user's computer to view all stored passwords without needing a password [20748]. This flaw was a result of how the passwords were stored and displayed within the browser, indicating a design vulnerability that could compromise sensitive information. (b) The software failure incident related to the operation phase is evident in the ease with which passwords could be accessed by simply clicking on settings and choosing the option to manage saved passwords in Chrome [20748]. This highlights a failure in the operation or use of the system, as users were able to access sensitive information without much technical knowledge or effort, indicating a usability issue in the system's operation.
Boundary (Internal/External) within_system (a) within_system: The software failure incident described in the article is primarily within the system. The flaw in the security of Google's Chrome browser that allowed anyone with access to a user's computer to view all stored passwords directly from the settings panel was a result of how the system was designed and implemented. The flaw was within the Chrome browser itself, allowing easy access to sensitive information without the need for a password [20748]. (b) outside_system: The incident does not involve contributing factors that originate from outside the system. The vulnerability was inherent within the Chrome browser's design and functionality, rather than being caused by external factors or attacks.
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident in this case was due to non-human actions, specifically a serious flaw in the security of Google's Chrome browser that allowed anyone with access to a user's computer to view all the passwords stored without needing a password [20748]. (b) On the other hand, human actions also played a role in this incident as the head of Google's Chrome developer team, Justin Schuh, was aware of the weakness but stated that there were no plans to change the system, which was criticized by others in the industry [20748].
Dimension (Hardware/Software) software (a) The software failure incident related to hardware: - The article does not mention any hardware-related contributing factors that led to the software failure incident. Therefore, it is unknown if hardware played a role in this specific incident. (b) The software failure incident related to software: - The software failure incident in this case is directly related to a serious flaw in the security of Google's Chrome browser. The flaw allowed anyone with access to a user's computer to view all the passwords stored for various sites without needing a password. This flaw originated in the software design of Chrome, allowing easy access to sensitive information stored within the browser [20748].
Objective (Malicious/Non-malicious) non-malicious (a) The software failure incident described in the article is non-malicious. The flaw in the security of Google's Chrome browser that allowed anyone with access to a user's computer to view all stored passwords was not intentionally introduced to harm the system. It was a vulnerability that was discovered by a software developer, Elliott Kember, who commented on the ease with which passwords could be accessed. The response from the head of Google's Chrome developer team, Justin Schuh, indicated that there were no plans to change the system, which was criticized by others in the developer community [20748]. (b) The incident did not involve malicious intent but rather highlighted a security flaw in the system that could potentially compromise user passwords. The concern raised was about the ease with which passwords could be accessed and the lack of additional security measures like a master password option. The incident was more about a design flaw and a debate around providing users with a false sense of security rather than a deliberate attempt to harm the system [20748].
Intent (Poor/Accidental Decisions) poor_decisions (a) The intent of the software failure incident related to poor_decisions can be inferred from the article. The incident involved a serious flaw in the security of Google's Chrome browser that allowed anyone with access to a user's computer to view all stored passwords without needing a password. Despite being aware of this weakness, the head of Google's Chrome developer team, Justin Schuh, stated that there were no plans to change the system. This decision was criticized by Sir Tim Berners-Lee and other developers, highlighting a poor decision in not addressing the security flaw [20748]. (b) The intent of the software failure incident related to accidental_decisions can also be observed in the article. The flaw that allowed easy access to stored passwords in Chrome was not necessarily an intentional design choice but rather a mistake or unintended consequence of the system's architecture. The article mentions that other browsers like Firefox and Internet Explorer had similar flaws in the past but took steps to address them, indicating that the visibility of passwords may have been an accidental oversight rather than a deliberate decision [20748].
Capability (Incompetence/Accidental) development_incompetence (a) The software failure incident related to development incompetence is evident in the article as it discusses a serious flaw in the security of Google's Chrome browser that allowed anyone with access to a user's computer to view all the passwords stored without needing a password. The head of Google's Chrome developer team, Justin Schuh, was aware of the weakness but stated that there were no plans to change the system, which was criticized by others in the industry, including Sir Tim Berners-Lee [Article 20748]. (b) The software failure incident related to accidental factors is also present in the article as it describes how the flaw in Chrome's password visibility was discovered by a software developer, Elliott Kember, who highlighted the ease with which passwords could be accessed by normal users without their knowledge. The article also mentions that other browsers had similar flaws in the past but had since closed them, indicating that the issue in Chrome was not intentional but rather an accidental oversight [Article 20748].
Duration permanent The software failure incident described in the article is more of a permanent nature. The flaw in the security of Google's Chrome browser that allowed easy access to stored passwords was a fundamental issue in the design and implementation of the software. The article mentions that the head of Google's Chrome developer team was aware of the weakness and had no plans to change the system, indicating a lack of immediate action to address the vulnerability [20748]. Additionally, the article discusses the debate within the development team about implementing a master password option but ultimately deciding against it to avoid providing users with a false sense of security, suggesting a more systemic issue with the software's security architecture rather than a temporary glitch or bug.
Behaviour value, other (a) crash: The incident described in the article does not involve a crash where the system loses state and stops performing its intended functions. Instead, it is a security flaw that allows unauthorized access to stored passwords in Google Chrome without requiring a password [Article 20748]. (b) omission: The software failure incident is not related to the system omitting to perform its intended functions at an instance(s). It is more about a security vulnerability that allows easy access to stored passwords without proper authentication [Article 20748]. (c) timing: The failure is not due to the system performing its intended functions too late or too early. It is a security flaw that allows immediate access to stored passwords without the required authentication [Article 20748]. (d) value: The software failure incident is related to the system performing its intended functions incorrectly by allowing unauthorized access to stored passwords without proper authentication. This can lead to compromising sensitive information [Article 20748]. (e) byzantine: The incident does not involve the system behaving erroneously with inconsistent responses and interactions. It is primarily a security vulnerability that allows straightforward access to stored passwords in Google Chrome [Article 20748]. (f) other: The behavior of the software failure incident can be categorized as a security vulnerability that exposes sensitive information (stored passwords) to unauthorized access without the necessary authentication. This poses a significant risk to user privacy and security [Article 20748].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence property (d) property: People's material goods, money, or data was impacted due to the software failure The software failure incident described in the article about a serious flaw in Google's Chrome browser allowed anyone with access to a user's computer to view all the passwords stored for email, social media, and other sites without needing a password. This flaw could compromise sensitive company login details if a user left their computer unattended with the screen active. The passwords were easily accessible by clicking on the Settings icon and choosing "Manage saved passwords," revealing the plain text of the passwords, which could then be copied or sent to an outside site [Article 20748]. This breach of security directly impacts the property of individuals and companies as their sensitive data and login credentials are at risk of being accessed and misused.
Domain finance (a) The software failure incident related to a serious flaw in the security of Google's Chrome browser, which could potentially compromise personal accounts and sensitive company login details stored in the browser [Article 20748]. (h) The incident also highlighted the security implications for users who save their passwords in Chrome, which is a critical aspect for the finance industry where the manipulation and movement of money require secure authentication methods [Article 20748]. (m) The software failure incident is not directly related to an industry not covered in the options provided.

Sources

Back to List