OWASP Top 10 - M8: Security Misconfiguration
.png)
Security Misconfiguration in Mobile Apps Threat Agents Attackers exploiting misconfigured security settings, permissions, or controls to gain unauthorized access. Threat agents include: Attackers with physical device access Malicious apps exploiting vulnerabilities Attack Vectors (Difficult to Exploit) Insecure default settings (weak security configurations) Improper access controls (unauthorized data access) Weak encryption/hashing (exposing sensitive data) Lack of secure communication (eavesdropping risk) Unprotected storage (plain-text sensitive data) Insecure file permissions (world-readable/writable) Misconfigured session management (session hijacking) Security Weakness (Common, Easy to Detect) Misconfigurations arise from time constraints, lack of awareness, or human error. Common issues: Debugging features left enabled in production Insecure communication (HTTP instead of HTTPS) Default usernames/passwords unchanged Weak access controls allowing unauthorized actions Impacts (Sev...