M1 7 articles

M1: Improper Credential Usage (2024)

OWASP Risk Analysis

Hardcoded credentials, insecure API key storage, and improper use of biometric or token-based authentication. Attackers extract secrets from app binaries or intercept credentials in transit.

Risk Assessment

Threat Agents
Threat agents exploit hardcoded credentials and improper credential handling in mobile applications through automated attacks using publicly available or custom-built tools.
Attack Vectors
Exploitability EASY
Adversaries exploit hardcoded credentials and improperly validated or stored credentials to gain unauthorized access to sensitive functionalities or bypass legitimate access requirements.
Security Weakness
Prevalence COMMON Detectability EASY
Poor credential management such as hardcoded credentials and improper handling creates severe security weaknesses. Security testing should identify these issues by locating hardcoded credentials in source code or configuration files.
Technical Impact
Impact SEVERE
Unauthorized users might gain access to sensitive information or functionality within the mobile app or backend systems, potentially leading to data breaches, loss of user privacy, fraudulent activity, and access to administrative functionality.
Business Impact
Impact SEVERE
Reputation damage, information theft, fraud, and unauthorized access to data.

Am I Vulnerable?

How Do I Prevent It?

Example Attack Scenarios

Based on OWASP Mobile Top 10 (2024) — the industry standard for mobile app security risks.

Platforms

Related Articles