M10 21 articles

M10: Insufficient Cryptography (2024)

OWASP Risk Analysis

Use of weak, deprecated, or improperly implemented cryptographic algorithms. Includes poor key management, predictable IVs, and insecure random number generation.

Risk Assessment

Threat Agents
Threat agents include attackers targeting weak algorithms, malicious insiders manipulating processes or leaking keys, state-sponsored actors conducting cryptanalysis, cybercriminals stealing data or committing fraud, and those leveraging protocol vulnerabilities.
Attack Vectors
Exploitability AVERAGE
Attackers exploit cryptographic vulnerabilities through cryptanalysis, brute force, or side-channel attacks against weak encryption algorithms, poor key management, or flawed implementations. Goals include decrypting data, unauthorized access, data breaches, and data forgery.
Security Weakness
Prevalence COMMON Detectability AVERAGE
Weaknesses include using weak encryption algorithms, inadequate key lengths, poor key management, insecure random number generation, flawed cryptographic protocol implementation, vulnerable libraries, and weak hash functions.
Technical Impact
Impact SEVERE
This vulnerability results in the unauthorized retrieval of sensitive information from the mobile device.
Business Impact
Impact SEVERE
Data breaches exposing PII, financial details, or intellectual property with legal liability and regulatory penalties. Intellectual property loss through decrypted proprietary algorithms or trade secrets. Financial losses from fraud and unauthorized fund access.

Am I Vulnerable?

How Do I Prevent It?

Example Attack Scenarios

Based on OWASP Mobile Top 10 (2024) — the industry standard for mobile app security risks.

Platforms

Related Articles

Tokopedia Mar 22, 2022

Query Hashing to Reduce GraphQL Payload Size

Expo Nov 19, 2025

Going Universal: From a brownfield React Native and Next.js stack to one Expo app

Bumble Aug 23, 2018

Universal Links for Android and iOS

Stone Sep 9, 2025

Two Years with Kotlin Multiplatform: From Zero to 55% Shared Code

Trendyol Aug 22, 2025

Building a Maestro Plugin for IntelliJ: From Mobile Test Automation to IDE Excellence

Lyft Jul 17, 2023

Being first to market with rideshare on CarPlay and Android Auto

ShareChat Feb 21, 2023

ShareChat addresses Jank issues to increase feed scrolling by 60%  |  Developer stories  |  Android Developers

Klarna May 10, 2022

Tree Shaking React Native Apps

Square Aug 24, 2021

Kotlin Multiplatform: Shared Test Resources

Dropbox Aug 14, 2019

The Not-So-Hidden Cost of Sharing Code Between iOS and Android

Badoo Aug 23, 2018

Universal Links for Android and iOS

SoundCloud Jan 1, 2011

iOS App Sharing Implementation

Posts on Medium Jan 3, 2026

HashMap and Set Performance Optimization in Android Kotlin

Doist Nov 20, 2025

Orchestrating our UI test suite with Maestro

Callstack Sep 23, 2025

Synchronizing Animated Values and Shared Values in React Native

Flutter Blog Feb 15, 2024

Sharing Flutter's 2024 Roadmap

Cash App Jun 21, 2021

Sharp Edges in Kotlin Coroutines Testing Tools

Bukalapak Mar 9, 2021

Speeding Up Android Unit Tests with Test Sharding on GitLab CI

Microsoft Dec 8, 2020

Keeping Android app size in check with React Native Upgrades | by Sparsha Saha | Microsoft Mobile Engineering | Medium

LinkedIn Jan 27, 2014

Mobile A/B Testing at LinkedIn: How Members Shape Our Apps

Spotify Nov 4, 2013

Shaving off 50% Waiting Time from the iOS Edit-Build-Test Cycle