This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Top IoT Vulnerabilities"
From OWASP
Craig Smith (talk | contribs) |
Craig Smith (talk | contribs) |
||
Line 97: | Line 97: | ||
* Current firmware version is not displayed and/or the last update date is not displayed | * Current firmware version is not displayed and/or the last update date is not displayed | ||
|- | |- | ||
+ | |} | ||
+ | |||
+ | The OWASP Top 10 IoT Vulnerabilities from 2014 are as follows: | ||
+ | |||
+ | {| border="1" class="wikitable" style="text-align: left" | ||
+ | ! Rank | ||
+ | ! Title | ||
+ | |- | ||
+ | | '''I1''' | ||
+ | | | ||
+ | * [[Top_10_2014-I1 Insecure Web Interface | Insecure Web Interface]] | ||
+ | |- | ||
+ | | '''I2''' | ||
+ | | | ||
+ | * [[Top_10_2014-I2 Insufficient Authentication/Authorization | Insufficient Authentication/Authorization]] | ||
+ | |- | ||
+ | | '''I3''' | ||
+ | | | ||
+ | * [[Top_10_2014-I3 Insecure Network Services | Insecure Network Services]] | ||
+ | |- | ||
+ | | '''I4''' | ||
+ | | | ||
+ | * [[Top_10_2014-I4 Lack of Transport Encryption | Lack of Transport Encryption/Integrity Verification]] | ||
+ | |- | ||
+ | | '''I5''' | ||
+ | | | ||
+ | * [[Top_10_2014-I5 Privacy Concerns | Privacy Concerns]] | ||
+ | |- | ||
+ | | '''I6''' | ||
+ | | | ||
+ | * [[Top_10_2014-I6 Insecure Cloud Interface | Insecure Cloud Interface]] | ||
+ | |- | ||
+ | | '''I7''' | ||
+ | | | ||
+ | * [[Top_10_2014-I7 Insecure Mobile Interface | Insecure Mobile Interface]] | ||
+ | |- | ||
+ | | '''I8''' | ||
+ | | | ||
+ | * [[Top_10_2014-I8 Insufficient Security Configurability | Insufficient Security Configurability]] | ||
+ | |- | ||
+ | | '''I9''' | ||
+ | | | ||
+ | * [[Top_10_2014-I9 Insecure Software/Firmware | Insecure Software/Firmware]] | ||
+ | |- | ||
+ | | '''I10''' | ||
+ | | | ||
+ | * [[Top_10_2014-I10 Poor Physical Security | Poor Physical Security]] | ||
+ | |- | ||
|} | |} |
Revision as of 19:45, 14 May 2016
The top IoT vulnerabilities (DRAFT) are as follow:
Vulnerability | Attack Surface | Summary |
---|---|---|
Username Enumeration |
|
|
Weak Passwords |
|
|
Account Lockout |
|
|
Unencrypted Services |
|
|
Two-factor Authentication |
|
|
Poorly Implemented Encryption |
|
|
Update Sent Without Encryption |
|
|
Update Location Writable |
|
|
Denial of Service |
|
|
Removal of Storage Media |
|
|
No Manual Update Mechanism |
|
|
Missing Update Mechanism |
|
|
Firmware Version Display and/or Last Update Date |
|
|
The OWASP Top 10 IoT Vulnerabilities from 2014 are as follows:
Rank | Title |
---|---|
I1 | |
I2 | |
I3 | |
I4 | |
I5 | |
I6 | |
I7 | |
I8 | |
I9 | |
I10 |