M5 6 articles

M5: Insecure Communication (2024)

OWASP Risk Analysis

Unencrypted network traffic, weak TLS configurations, and missing certificate validation. Attackers intercept data via man-in-the-middle attacks on mobile networks.

Risk Assessment

Threat Agents
Adversaries sharing your local network (compromised or monitored Wi-Fi), rogue carrier or network devices, or malware on the device can intercept unencrypted or poorly encrypted data for theft, espionage, or identity fraud.
Attack Vectors
Exploitability EASY
Modern applications often rely on SSL/TLS but implementations frequently contain flaws: using deprecated protocols or bad configuration settings, accepting invalid certificates, or implementing SSL/TLS inconsistently across only select workflows like authentication.
Security Weakness
Prevalence COMMON Detectability AVERAGE
Mobile applications frequently exhibit inconsistencies in transport security implementation, exposing data and session IDs to interception. Basic flaws can be identified through network traffic observation, but subtler implementation issues require deeper architectural analysis.
Technical Impact
Impact SEVERE
Exposes user data which can lead to account takeover, user impersonation, PII data leaks, and more. Intercepted credentials, session tokens, and 2FA codes enable sophisticated follow-on attacks.
Business Impact
Impact MODERATE
Data interception causes privacy violations potentially resulting in identity theft, fraud, or reputational damage to organizations.

Am I Vulnerable?

How Do I Prevent It?

Example Attack Scenarios

Based on OWASP Mobile Top 10 (2024) — the industry standard for mobile app security risks.

Platforms

Related Articles