The application does not define an SSLPinning mechanism or configures it insecurely, allowing an attacker to intercept and manipulate the information that travels through the application
- Intercept data from the app.
- Tamper data from the app.
- Implement robust security controls for certificates, offering either a predefined set of trusted Certification Authorities or incorporating integrity checks and white lists of trusted public keys that the application will accept.
- In res/xml/network_security_config.xml
- Define pin-sets with integrity hashes.
- Set trust-anchors by providing a list
of trusted Certification Authorities.
Anonymous attacker from the Internet.
⌚ 300 minutes.
Default score using CVSS 3.1. It may change depending on the context of the src.
Default score using CVSS 4.0. It may change depending on the context of the src.
There are correctly defined pin-sets in the security configuration file
example.com
ZC3lTYTDBJQVf1P2V7+fibTqbIsWNR/X7CWNVW+CEEA=
GUAL5bejH7czkXcAeJ0vCiRxwMnVBsDlBMBsFtfLF8A=
The application does not define any SSLPining mechanisms in the security configuration xml file
example.com