M10 1 article

M10: Insufficient Cryptography (2024)

OWASP Risk Analysis

Use of weak, deprecated, or improperly implemented cryptographic algorithms. Includes poor key management, predictable IVs, and insecure random number generation.

Risk Assessment

Threat Agents
Threat agents include attackers targeting weak algorithms, malicious insiders manipulating processes or leaking keys, state-sponsored actors conducting cryptanalysis, cybercriminals stealing data or committing fraud, and those leveraging protocol vulnerabilities.
Attack Vectors
Exploitability AVERAGE
Attackers exploit cryptographic vulnerabilities through cryptanalysis, brute force, or side-channel attacks against weak encryption algorithms, poor key management, or flawed implementations. Goals include decrypting data, unauthorized access, data breaches, and data forgery.
Security Weakness
Prevalence COMMON Detectability AVERAGE
Weaknesses include using weak encryption algorithms, inadequate key lengths, poor key management, insecure random number generation, flawed cryptographic protocol implementation, vulnerable libraries, and weak hash functions.
Technical Impact
Impact SEVERE
This vulnerability results in the unauthorized retrieval of sensitive information from the mobile device.
Business Impact
Impact SEVERE
Data breaches exposing PII, financial details, or intellectual property with legal liability and regulatory penalties. Intellectual property loss through decrypted proprietary algorithms or trade secrets. Financial losses from fraud and unauthorized fund access.

Am I Vulnerable?

How Do I Prevent It?

Example Attack Scenarios

Based on OWASP Mobile Top 10 (2024) — the industry standard for mobile app security risks.

Platforms

Related Articles