This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit

Top 10 IoT Vulnerabilities (2014)

Jump to: navigation, search
Back To The Top 10 Iot Vulnerabilities Project

For each attack surface areas, the following sections are included:

  • A description of the attack surface
  • Threat agents
  • Attack vectors
  • Security weaknesses
  • Technical impacts
  • Business impacts
  • Example vulnerabilities
  • Example attacks
  • Guidance on how to avoid the issue
  • References to OWASP and other related resources