Skip to content

Commit faaddee

Browse files
author
Sven Schleier
committed
draft MASWE-0100
1 parent 34b11d5 commit faaddee

File tree

1 file changed

+31
-6
lines changed

1 file changed

+31
-6
lines changed

weaknesses/MASVS-RESILIENCE/MASWE-0100.md

Lines changed: 31 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -19,12 +19,37 @@ refs:
1919
- https://github.com/iansampson/AppAttest
2020
- https://github.com/firebase/firebase-ios-sdk/blob/v8.15.0/FirebaseAppCheck/Sources/AppAttestProvider/DCAppAttestService%2BFIRAppAttestService.h
2121
- https://blog.restlesslabs.com/john/ios-app-attest
22-
draft:
23-
description: The app doesn't use App Attestation APIs, such as Google Play Integrity API, iOS DeviceCheck API,so the backend cannot ensure requests originate from a genuine app binary (CWE-693). This exposes the app to tampering, fraud, replay attacks, and unauthorized use of premium features.
24-
topics:
25-
- detection in place
26-
- Effectiveness Assessment (e.g. bypassing the detection)
27-
status: placeholder
22+
status: new
2823

2924
---
3025

26+
## Overview
27+
28+
Device attestation is a security mechanism that allows a mobile application or backend service to verify the integrity and trustworthiness of the environment in which the application is running. It provides cryptographic proof that the device has not been tampered with.
29+
30+
In this context it need to be differentiated between attestation and assertion:
31+
32+
- **Attestation** - Occurs during the registration phase, when your app initially connects to your server.
33+
- **Assertion** - Is used during subsequent interactions, whenever the app needs to authenticate again or make further requests.
34+
35+
If device attestation is used also app attestation should be considered to confirm that the application instance is genuine. App attestation provides cryptographic proof that the app instance is trustworthy and genuine.
36+
37+
Attestation can be performed locally on the device or remotely through a backend service. Local checks rely on the application itself to verify system integrity, but these can be bypassed by attackers with sufficient control over the environment (e.g., through hooking and modifying the app during runtime). Server-side attestation shifts the verification to a backend service, which can make it harder for attackers to tamper with the verification logic.
38+
39+
To summarize:
40+
41+
- **Device attestation** confirms the environment is trustworthy.
42+
- **App attestation** confirms the app instance is trustworthy.
43+
44+
If the app doesn't use attestation APIs or services the backend cannot ensure requests originate from a genuine app binary and from a trusted platform.
45+
46+
## Impact
47+
48+
- **Abuse of Functionality**: Backend systems cannot distinguish between legitimate and tampered apps, enabling abuse such as fake account creation, fraud or unauthorized use of premium features.
49+
- **App Executed in outdated Environment**: Users may run the application on outdated platforms that have no security patches installed.
50+
- **App Executed in untrusted Environment**: Attackers may run the application on rooted or jailbroken devices without detection.
51+
52+
## Mode of Introduction
53+
54+
- **Weak Architecture**: The application does not include device attestation in its security model, assuming the device environment can be trusted.
55+
- **Reliance on Weak Checks**: Instead of proper attestation, the app only performs basic root/jailbreak detection, which is easily bypassed.

0 commit comments

Comments
 (0)