You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
description: The app doesn't use App Attestation APIs, such as Google Play Integrity API, iOS DeviceCheck API,so the backend cannot ensure requests originate from a genuine app binary (CWE-693). This exposes the app to tampering, fraud, replay attacks, and unauthorized use of premium features.
24
-
topics:
25
-
- detection in place
26
-
- Effectiveness Assessment (e.g. bypassing the detection)
27
-
status: placeholder
22
+
status: new
28
23
29
24
---
30
25
26
+
## Overview
27
+
28
+
Device attestation is a security mechanism that allows a mobile application or backend service to verify the integrity and trustworthiness of the environment in which the application is running. It provides cryptographic proof that the device has not been tampered with.
29
+
30
+
In this context it need to be differentiated between attestation and assertion:
31
+
32
+
-**Attestation** - Occurs during the registration phase, when your app initially connects to your server.
33
+
-**Assertion** - Is used during subsequent interactions, whenever the app needs to authenticate again or make further requests.
34
+
35
+
If device attestation is used also app attestation should be considered to confirm that the application instance is genuine. App attestation provides cryptographic proof that the app instance is trustworthy and genuine.
36
+
37
+
Attestation can be performed locally on the device or remotely through a backend service. Local checks rely on the application itself to verify system integrity, but these can be bypassed by attackers with sufficient control over the environment (e.g., through hooking and modifying the app during runtime). Server-side attestation shifts the verification to a backend service, which can make it harder for attackers to tamper with the verification logic.
38
+
39
+
To summarize:
40
+
41
+
-**Device attestation** confirms the environment is trustworthy.
42
+
-**App attestation** confirms the app instance is trustworthy.
43
+
44
+
If the app doesn't use attestation APIs or services the backend cannot ensure requests originate from a genuine app binary and from a trusted platform.
45
+
46
+
## Impact
47
+
48
+
-**Abuse of Functionality**: Backend systems cannot distinguish between legitimate and tampered apps, enabling abuse such as fake account creation, fraud or unauthorized use of premium features.
49
+
-**App Executed in outdated Environment**: Users may run the application on outdated platforms that have no security patches installed.
50
+
-**App Executed in untrusted Environment**: Attackers may run the application on rooted or jailbroken devices without detection.
51
+
52
+
## Mode of Introduction
53
+
54
+
-**Weak Architecture**: The application does not include device attestation in its security model, assuming the device environment can be trusted.
55
+
-**Reliance on Weak Checks**: Instead of proper attestation, the app only performs basic root/jailbreak detection, which is easily bypassed.
0 commit comments