This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Top IoT Vulnerabilities"
From OWASP
Craig Smith (talk | contribs) |
Craig Smith (talk | contribs) |
||
| Line 97: | Line 97: | ||
* Current firmware version is not displayed and/or the last update date is not displayed | * Current firmware version is not displayed and/or the last update date is not displayed | ||
|- | |- | ||
| + | |} | ||
| + | |||
| + | The OWASP Top 10 IoT Vulnerabilities from 2014 are as follows: | ||
| + | |||
| + | {| border="1" class="wikitable" style="text-align: left" | ||
| + | ! Rank | ||
| + | ! Title | ||
| + | |- | ||
| + | | '''I1''' | ||
| + | | | ||
| + | * [[Top_10_2014-I1 Insecure Web Interface | Insecure Web Interface]] | ||
| + | |- | ||
| + | | '''I2''' | ||
| + | | | ||
| + | * [[Top_10_2014-I2 Insufficient Authentication/Authorization | Insufficient Authentication/Authorization]] | ||
| + | |- | ||
| + | | '''I3''' | ||
| + | | | ||
| + | * [[Top_10_2014-I3 Insecure Network Services | Insecure Network Services]] | ||
| + | |- | ||
| + | | '''I4''' | ||
| + | | | ||
| + | * [[Top_10_2014-I4 Lack of Transport Encryption | Lack of Transport Encryption/Integrity Verification]] | ||
| + | |- | ||
| + | | '''I5''' | ||
| + | | | ||
| + | * [[Top_10_2014-I5 Privacy Concerns | Privacy Concerns]] | ||
| + | |- | ||
| + | | '''I6''' | ||
| + | | | ||
| + | * [[Top_10_2014-I6 Insecure Cloud Interface | Insecure Cloud Interface]] | ||
| + | |- | ||
| + | | '''I7''' | ||
| + | | | ||
| + | * [[Top_10_2014-I7 Insecure Mobile Interface | Insecure Mobile Interface]] | ||
| + | |- | ||
| + | | '''I8''' | ||
| + | | | ||
| + | * [[Top_10_2014-I8 Insufficient Security Configurability | Insufficient Security Configurability]] | ||
| + | |- | ||
| + | | '''I9''' | ||
| + | | | ||
| + | * [[Top_10_2014-I9 Insecure Software/Firmware | Insecure Software/Firmware]] | ||
| + | |- | ||
| + | | '''I10''' | ||
| + | | | ||
| + | * [[Top_10_2014-I10 Poor Physical Security | Poor Physical Security]] | ||
| + | |- | ||
|} | |} | ||
Revision as of 19:45, 14 May 2016
The top IoT vulnerabilities (DRAFT) are as follow:
| Vulnerability | Attack Surface | Summary |
|---|---|---|
| Username Enumeration |
|
|
| Weak Passwords |
|
|
| Account Lockout |
|
|
| Unencrypted Services |
|
|
| Two-factor Authentication |
|
|
| Poorly Implemented Encryption |
|
|
| Update Sent Without Encryption |
|
|
| Update Location Writable |
|
|
| Denial of Service |
|
|
| Removal of Storage Media |
|
|
| No Manual Update Mechanism |
|
|
| Missing Update Mechanism |
|
|
| Firmware Version Display and/or Last Update Date |
|
|
The OWASP Top 10 IoT Vulnerabilities from 2014 are as follows:
| Rank | Title |
|---|---|
| I1 | |
| I2 | |
| I3 | |
| I4 | |
| I5 | |
| I6 | |
| I7 | |
| I8 | |
| I9 | |
| I10 |