M6 2 articles

M6: Inadequate Privacy Controls (2024)

OWASP Risk Analysis

Excessive data collection, missing consent mechanisms, and PII leakage. Apps expose personal data through logs, analytics, or insecure storage.

Risk Assessment

Threat Agents
Privacy controls protect Personally Identifiable Information (PII) such as names, addresses, credit card information, email, IP addresses, health data, religious beliefs, sexuality, and political opinions. Attackers target this data to impersonate victims, misuse payment information, blackmail users, or destroy critical information.
Attack Vectors
Exploitability AVERAGE
PII sources include app sandboxes, network communications, logs, and backups (well-protected); URL query parameters and clipboard content (moderately protected). Attackers typically breach security at other levels first through network eavesdropping, file system access, clipboard access, log inspection, or device backup analysis.
Security Weakness
Prevalence COMMON Detectability EASY
Almost all apps process PII, with many collecting more than necessary. Careless developer handling increases vulnerability risk. An app is vulnerable to privacy infringements if personal data it collects motivates an attacker to manipulate or abuse that data through insufficiently secured channels.
Technical Impact
Impact LOW
Privacy violations create minimal technical system impact unless PII includes authentication data affecting traceability. Data manipulation may render systems unusable for affected users and potentially disturb backends lacking proper sanitization.
Business Impact
Impact SEVERE
Violation of legal regulations (GDPR, CCPA, PDPA, PIPEDA, LGPD) with corporate sanctions. Financial damage from lawsuits. Reputational damage and reduced sales/usage. Loss or theft of PII enabling social engineering attacks.

Am I Vulnerable?

How Do I Prevent It?

Example Attack Scenarios

Based on OWASP Mobile Top 10 (2024) — the industry standard for mobile app security risks.

Platforms

Related Articles

Swiggy Sep 20, 2022

Consent Matters

Swift.org Blog Mar 6, 2026

Building Privacy-First Analytics with Swift