M3 5 articles

M3: Insecure Authentication/Authorization (2024)

OWASP Risk Analysis

Weak authentication flows, missing session management, and broken access controls. Attackers bypass login, escalate privileges, or hijack sessions.

Risk Assessment

Threat Agents
Threat agents exploit authentication and authorization vulnerabilities through automated attacks leveraging available or custom-built tools, including mobile malware and botnets.
Attack Vectors
Exploitability EASY
Adversaries exploit weaknesses by faking or bypassing authentication through direct backend service requests circumventing the mobile app, or by logging in legitimately then force-browsing to vulnerable endpoints for unauthorized functionality.
Security Weakness
Prevalence COMMON Detectability AVERAGE
Poor authorization allows privilege escalation especially when decisions occur on-device rather than server-side. Weak authentication enables anonymous functionality execution due to factors like short passwords or 4-digit PINs common to mobile interfaces.
Technical Impact
Impact SEVERE
Over-privileged execution can destroy systems or expose sensitive data. Authentication failures prevent user identification, eliminating audit trails and attack source detection.
Business Impact
Impact SEVERE
Reputation damage, information theft, fraud, and unauthorized data access.

Am I Vulnerable?

How Do I Prevent It?

Example Attack Scenarios

Based on OWASP Mobile Top 10 (2024) — the industry standard for mobile app security risks.

Platforms

Related Articles