OWASP Top 10 Mobile 2024: The Latest Threats to Mobile App Security

Written by

Published on

With the exponential growth in usage of mobile applications and consumers finding more convenience and ease of usage for different activities, the vulnerabilities associated with mobile apps have also increased. OWASP Mobile Top 10 is one such list that highlights the security flaws & vulnerabilities developers need to protect their applications from. 

The list is updated regularly to reflect the changing landscape of mobile security threats. Between 2016 and 2024, there have been significant changes in the types of threats facing mobile applications. These changes may include the emergence of new types of vulnerabilities, shifts in the popularity of certain types of attacks, and advancements in security technology. The OWASP mobile top 10 2024 list guides developers and organizations to stay up to date with these changes in order to protect their mobile applications from potential security breaches.

OWASP Top 10 Mobile Risks 2024 (Final Release)

M1: Improper Credential Usage
M2: Inadequate Supply Chain Security
M3: Insecure Authentication/Authorization
M4: Insufficient Input/Output Validation
M5: Insecure Communication
M6: Inadequate Privacy Controls
M7: Insufficient Binary Protections
M8: Security Misconfiguration
M9: Insecure Data Storage
M10: Insufficient Cryptography 

OWASP Top 10 Mobile Risks 2016 (Final List)

M1: Improper Platform Usage
M2: Insecure Data Storage
M3: Insecure Communication
M4: Insecure Authentication
M5: Insufficient Cryptography
M6: Insecure Authorisation
M7: Client Code Quality
M8: Code Tampering
M9: Reverse Engineering
M10: Extraneous Functionality 

What’s Changed in OWASP Top 10 Mobile: 2024 vs 2016

2024 Category 2016 Equivalent (if any) Notes / Change Type
Improper Credential Usage New – Focuses on handling and protecting credentials securely.
Inadequate Supply Chain Security New – Addresses third-party dependencies and supply chain risks.
Insecure Authentication/Authorization M4: Insecure Authentication, M6: Insecure Authorization Merged & Expanded – Combines and strengthens auth/authz concerns.
Insufficient Input/Output Validation New – Emphasizes validation of user and system data flows.
Insecure Communication M3: Insecure Communication Persisted – Still relevant, minimal changes.
Inadequate Privacy Controls New – Privacy emphasis reflecting regulatory and user concerns.
Insufficient Binary Protections M7: Client Code Quality, M8: Code Tampering, M9: Reverse Engineering Consolidated – Broader coverage of binary hardening and resilience.
Security Misconfiguration New – Captures misconfigurations in mobile environments.
Insecure Data Storage M2: Insecure Data Storage Persisted – Still critical in 2024.
Insufficient Cryptography M5: Insufficient Cryptography Persisted – Continued importance, little change.
M1: Improper Platform Usage Dropped – Platform misuse is no longer standalone.
M10: Extraneous Functionality Dropped – Removed as a distinct category.

New Categories in OWASP Mobile Top 10 2024

M4: Insufficient Input/Output Validation: 

This new category emphasizes the importance of validating both the input and output data in mobile applications. Proper validation is crucial to prevent issues such as SQL injection, command injection, and cross-site scripting (XSS) attacks. This category highlights the need for rigorous data validation practices to ensure data safety and maintain the integrity of the application.

Example

A mobile application accepts user input to search for products but does not properly sanitize the input. This allows an attacker to inject SQL commands through the search feature, leading to an SQL injection attack that compromises the database.

Solution

Implement comprehensive input validation on the client and server sides to ensure only expected and safe data is processed. Use a whitelist approach to accept only known good data. Additionally, output data should be encoded to prevent XSS attacks.

M6: Inadequate Privacy Controls: 

Reflecting the growing global concern for user privacy, this category addresses the risks associated with insufficient privacy measures in mobile apps. It focuses on protecting Personally Identifiable Information (PII), ensuring consent mechanisms for data collection, and handling user data responsibly to prevent privacy breaches and legal issues.

Example: 

A health tracking app collects and transmits users’ health data without adequately informing the user or obtaining their consent. Additionally, the app fails to provide users with options to control what data is shared, leading to privacy violations.

Solution: 

Develop a clear privacy policy that informs users about the data you collect and how it will be used. Implement explicit consent mechanisms before collecting data and provide users with privacy settings to control their data. Regularly review and update privacy practices to comply with legal requirements and best practices.

M8: Security Misconfiguration:

This category deals with those OWASP top 10 mobile vulnerabilities that result from incorrect or incomplete security configurations. It includes issues such as deploying apps with default settings, misconfigured permissions, and erroneous security settings, which can lead to unauthorized access and data breaches.

Example: 

An e-commerce mobile app is deployed with its debug mode enabled, which inadvertently exposes sensitive information through system logs. This includes payment information and personal details that attackers can access if they exploit other vulnerabilities in the app.

Solution: 

Regularly audit and review app configurations and deployment environments for security settings. Disable debug information and unnecessary services. Ensure that all system components are set to secure values and that permissions are correctly configured to follow the principle of least privilege.

Categories with Naming and Scoping Changes 

M1: Improper Credential Usage (previously Improper Platform Usage): 

This updated category highlights the risks associated with the misuse of credentials in mobile applications, such as hardcoding sensitive information or improper management of user credentials.

Example: 

A mobile app stores OAuth tokens in plain text within the device’s shared preferences, making it easy for a malicious app installed on the same device to access and use these tokens to impersonate the user.

Solution: 

Securely store credentials using the platform’s secure storage solutions, like Android Keystore and iOS Keychain. Avoid storing sensitive information in plain text or in easily accessible locations. Implement additional security measures like encryption and tokenization to protect credentials.

M2: Inadequate Supply Chain Security (previously Insecure Data Storage): 

Reflecting the growing importance of supply chain integrity, this category focuses on the risks in the supply chain of mobile apps, including vulnerabilities in third-party components and dependencies.

Example: 

A mobile game uses a third-party analytics SDK that contains a known vulnerability allowing an attacker to execute code remotely. The game developers failed to vet the SDK thoroughly, leading to a potential compromise of user data.

Solution: 

Conduct thorough security vetting of all third-party components before integrating them into the application. Regularly update these components to incorporate security patches. Use software composition analysis tools to track and monitor third-party dependencies for known vulnerabilities.

M3: Insecure Authentication/Authorization (previously Insecure Communication): 

This category now emphasizes the importance of robust authentication and authorization mechanisms in mobile apps to prevent unauthorized access and data breaches.

Example: 

A mobile banking app does not require re-authentication for sensitive transactions once a user is logged in. An attacker with temporary access to the device can transfer funds without the device owner’s consent.

Solution: 

Implement strong authentication mechanisms, such as multi-factor authentication, to secure user accounts. Ensure that authorization checks are performed server-side for each action that accesses sensitive information or functionality.

M5: Insecure Communication (previously Insecure Authentication):

Renamed to specifically address the risks associated with insecure data transmission, such as the interception of sensitive data due to the use of unencrypted channels or inadequate encryption methods.

Example: 

A messaging app sends messages between users without encrypting the data. An attacker on the same network can perform a man-in-the-middle attack to intercept and read the messages.

Solution: 

Use Transport Layer Security (TLS) for all data in transit. Implement certificate pinning to prevent man-in-the-middle (MITM) attacks. Ensure that all communication endpoints are secured with up-to-date and strong encryption algorithms.

Consolidated Threat in OWASP Mobile Top 10

M7: Insufficient Binary Protections: 

This category combines the risks associated with code tampering and reverse engineering from the 2016 list. It focuses on protecting the binary code of mobile apps from being tampered with or reverse-engineered.

Example: 

An attacker uses a tool to reverse engineer a popular mobile game’s binary to find and exploit a vulnerability that allows them to unlock premium features without payment.

Solution: 

Use obfuscation techniques to make reverse engineering more difficult. Implement tamper detection mechanisms that alert you or invalidate the app if modifications are detected. Use tools that harden the binary against attacks.

M9: Insecure Data Storage: 

Now includes the risks related to extraneous functionality from the 2016 list. It emphasizes the need for secure storage practices and strong encryption to protect sensitive data stored on mobile devices.

M9: Insecure Data Storage: 

Now includes the risks related to extraneous functionality from the 2016 list. It emphasizes the need for secure storage practices and strong encryption to protect sensitive data stored on mobile devices.

Example: 

A fitness app stores workout history and location data in an unencrypted database file on the device. If the device is lost or stolen, an unauthorized individual could access this sensitive information.

Solution: 

Encrypt sensitive data stored locally on the device using strong encryption algorithms. Ensure that encryption keys are securely managed and not hard-coded into the application. Apply secure storage practices provided by the mobile operating system.

M10: Insufficient Cryptography: 

Combines the risks associated with broken cryptography from the 2016 list. This category highlights the importance of using strong and properly implemented cryptographic practices to ensure data confidentiality and integrity.

Removed Category 

M7: Client Code Quality: 

This category from the 2016 list has been merged with M4 (Insufficient Input/Output Validation) in the 2024 edition.

The OWASP Mobile Top 10 updates released recently highlight the ever-evolving landscape of mobile security threats and the industry’s proactive measures to combat them. The OWASP Mobile Top 10 2024 offers a comprehensive framework that equips developers, testers, and security professionals with the knowledge and tools to effectively tackle the most pressing security risks in mobile applications. To delve deeper into each category and access detailed information and prevention strategies, DoveRunner is right there for your assistance.

How can DoveRunner help Secure Mobile Apps against OWASP threats?

DoveRunner provides an advanced mobile application security framework that aligns directly with the OWASP Mobile Top 10 2024. By integrating security controls at every stage of the mobile app lifecycle that is design, development, testing, and deployment, DoveRunner ensures apps are proactively defended against evolving threats.

  • Threat Modeling & Risk Assessment:

DoveRunner identifies vulnerabilities early by mapping app functionalities against OWASP categories like insecure authentication, data leakage, or insufficient cryptography.

  • Automated Security Testing:

Built-in tools simulate real-world attack vectors to detect misconfigurations, weak encryption, or unsafe data storage before release.

  • Runtime Protection:

DoveRunner deploys runtime application self-protection (RASP) to shield apps from reverse engineering, tampering, and malicious API calls.

  • Compliance Alignment:

By addressing OWASP risks systematically, DoveRunner helps teams maintain compliance with industry standards such as GDPR, HIPAA, and PCI DSS.

  • Continuous Monitoring:

Beyond launch, the platform continuously scans for new threats and ensures apps remain protected as OWASP threat models evolve.

By combining proactive testing, runtime defense, and compliance-driven reporting, DoveRunner makes mobile app security both scalable and reliable.

Frequently Asked Questions

  • What’s the difference between Mobile OWASP Top 10 2016 and 2024?

The Mobile App OWASP Top 10 2016 emphasized early risks like poor server-side controls, weak authentication, and insecure communication. The 2024 owasp top 10 mobile threats reflect how threats have evolved, with more focus on supply chain risks, insecure data storage on modern devices, and advanced client-side attacks like code injection and tampering. In short, 2024 broadens the scope, covering ecosystem-level threats rather than just device-level vulnerabilities.

  • Who should care about the OWASP Mobile Top 10?

The list is relevant not just for mobile app developers, but also for:

  • Product managers ensure apps meet compliance standards.
  • Security teams responsible for penetration testing and vulnerability management.
  • Business leaders who want to safeguard brand trust and prevent costly breaches.

Essentially, anyone involved in building, testing, or deploying mobile apps should be familiar with OWASP’s guidance.

  • Is the OWASP Mobile Top 10 2024 list relevant to both Android and iOS apps?

Yes. While Android and iOS have different architectures, permission models, and security controls, the OWASP Top 10 Mobile applies universally. Risks like insecure authentication, weak cryptography, or insecure data storage are common across both platforms. DoveRunner’s framework adapts to platform-specific nuances, ensuring robust protection regardless of the OS.

  • How can mobile app developers effectively address these security risks?

Developers can mitigate OWASP-listed risks by adopting secure coding practices and leveraging tools like DoveRunner. Best mobile app security practices include:

  • Using strong encryption for sensitive data storage and transmission.
  • Enforcing multi-factor authentication (MFA) and secure session management.
  • Regularly conducting penetration tests and code reviews.
  • Applying security patches and updates promptly.
  • Leveraging runtime protections like obfuscation and anti-tampering.

By embedding security into the development workflow rather than treating it as an afterthought, teams can build resilient apps that stay protected against evolving OWASP threats.

Resources for Effective Security

효과적인 보안을 위한 리소스

아직 망설여지시나요?
강력한 보안 솔루션을 직접
경험해 보세요!

Still not convinced? Experience our powerful solutions for yourself.

Scroll to Top