M3 22 articles

M3: Insecure Authentication/Authorization (2024)

OWASP Risk Analysis

Weak authentication flows, missing session management, and broken access controls. Attackers bypass login, escalate privileges, or hijack sessions.

Risk Assessment

Threat Agents
Threat agents exploit authentication and authorization vulnerabilities through automated attacks leveraging available or custom-built tools, including mobile malware and botnets.
Attack Vectors
Exploitability EASY
Adversaries exploit weaknesses by faking or bypassing authentication through direct backend service requests circumventing the mobile app, or by logging in legitimately then force-browsing to vulnerable endpoints for unauthorized functionality.
Security Weakness
Prevalence COMMON Detectability AVERAGE
Poor authorization allows privilege escalation especially when decisions occur on-device rather than server-side. Weak authentication enables anonymous functionality execution due to factors like short passwords or 4-digit PINs common to mobile interfaces.
Technical Impact
Impact SEVERE
Over-privileged execution can destroy systems or expose sensitive data. Authentication failures prevent user identification, eliminating audit trails and attack source detection.
Business Impact
Impact SEVERE
Reputation damage, information theft, fraud, and unauthorized data access.

Am I Vulnerable?

How Do I Prevent It?

Example Attack Scenarios

Based on OWASP Mobile Top 10 (2024) — the industry standard for mobile app security risks.

Platforms

Related Articles

AWS Mar 14, 2019

Amplify Framework adds authentication features and enhancements for iOS and Android Mobile SDKs

Android Developers Blog Mar 4, 2026

How WHOOP Decreased Excessive Partial Wake Lock Sessions by Over 90%

Medium Oct 6, 2025

Medium Android App — Migrating from Apollo Kotlin 3 to 4: Lessons Learned

DoorDash Nov 7, 2023

Leveraging Flink to Detect User Sessions and Engage DoorDash Consumers with Real-Time Notifications

Swiggy Jul 18, 2023

Login & Signup Result Improvement in Swiggy Android App

Google Jul 9, 2018

Android Emulator AMD Processor Hyper-V Support

BlaBlaCar Mar 28, 2018

Android O Migration: Lessons Learned

React Native Blog Mar 22, 2018

Building Input Accessory View For React Native

X (formerly Twitter) Aug 6, 2013

Login Verification On Twitter For iPhone And Android

Posts on Reddit Nov 26, 2024

Why is there so much obsession on app size reduction?

Auth0 Mar 26, 2024

Auth0 Flutter SDK vs API: Which one should you pick?

NordVPN Nov 29, 2023

Android Developers Blog: NordVPN boosted the speed of its login user flow by 60% using Baseline Profiles

Klarna Nov 15, 2022

6 Lessons Learned from Optimizing the Performance of a Node.js Service

Shopify Sep 22, 2022

Lessons Building Android Widgets

DoorDash Aug 30, 2022

[Mobile Web] DoorDash's Lessons on Improving Performance on High-Traffic Web Pages

Pinterest Aug 9, 2022

Four Lessons in Making Pinterest Faster on Android

Mercado Libre May 26, 2022

Dê seus primeiros passos em Mobile

Meta Nov 16, 2021

Android Developers Blog: Improving App Startup: Lessons from the Facebook App

Expedia Apr 8, 2021

Lessons in SwiftUI

DoorDash Apr 7, 2021

Optimizing OpenTelemetry's Span Processor for High Throughput and Low Latency

Coinbase Sep 10, 2020

Lessons from training teams to use React Native

SoundCloud Jan 1, 2011

iOS App Sharing Implementation