Introduction
Cryptography adds security to your system, as we all know. However, it might not always be a case. OWASP Top 10 list is out. As usual, it again educated us about the most dangerous and attention-worthy cyber vulnerabilities in the world.Â
What concerns us, and many other API security professionals, is the A02:2021 â Cryptographic Failures, which is a new entry and still made at the second spot. This is certainly a bit shocking as till the Top 10 (2017 list), there wasnât any mention of it.
It certainly caused a stir in the developer and cybersecurity industry. In case youâre curious to know more about this vulnerability, scroll down. As it is causing more trouble than you can imagine, we have covered its meaning and preventive ways to help you cope with it better.
As per the OWASP cryptographic failure definition (2021), itâs a symptom instead of a cause. This failure is responsible for the exposure/leaking of data of critical and sensitive nature to ill-intended resources/people. Missing out on safeguarding such data leads to theft, public listing, breaches, and other problems.
In the 2017 list, the vulnerability named Sensitive Data Exposure was covering this. Only in the 2021 list, it became Cryptographic Failure OWASP when the scope was narrowed down to cryptography for the business-critical data. Here, the most common CWEs covered are:Â
Note: CWE stands for Common Weakness Enumerations.
When it comes to managing sensitive data, one must understand that both the resting and in-resting data should be taken into account.Â
Resting data is the data not used by any application presently but is important. Stored passwords and user information for accessing applications are examples of such data. unpublished offline data of an organization or old archives can also be considered the resting data.
It is better that businesses use well-encrypted or hased storage spaces, you are susceptible to cryptographic failure vulnerability.
Data en-route or in-transit, as clear from the name itself, is the data that an application is currently processing or using. For instance, the banking details being sent out through an encrypted medium during a payment process can become a victim of a man-in-the-middle attack.
To help you develop a better grasp on the topic, we present you with the most common cryptographic failure examples.
â
Example #1
Suppose there is an app-based solution encrypting credit card details with automated database encryption and fails to decrypt it automatically upon retrieving. This creates a scope for SQL injection attacks. With a successful SQL injection attack, an attacker can find out the saved credit card details and use them as per the will.
Example #2
In the case of websites, having weak encryption and not the implementation of TLS encryption on all the website pages is a major threat. Such websites become prime targets of attackers as they can easily monitor the traffic, access all the requests made, steal cookies, and force the connection to drop to HTTP from HTTPS.Â
The hassles donât end here. Threat actors can use the hijacked cookies and use them against the user to access sensitive data. Also, such poorly encrypted websites give attackers a chance to modify the transported data.
Example #3
Password databases generally use simple or unsalted hashes for password data storage. Any file upload error occurring in password databases is an opportunity for attackers to steal the password and use them for their benefit. If that happens, passwords stored using unsalted hashes will be exposed to pre-calculated hashes while the simple hash stored password will be cracked by GPUs.
â
OWASP not only tells you about the vulnerabilities but also suggests viable remedial solutions to fix these vulnerabilities. This way, if an issue makes it to the 2021 list, the chances of it appearing in OWASP Top 10 2022 or beyond, decrease.
It helps For cryptographic failures as well, detailed preventive methods are suggested.
â
Even though A02:2021 â Cryptographic Failures is a tough nut to crack, one can manage to stay safe from this vulnerability with a little bit of attention and the right resources.Â
Wallarm, an industry-renowned API security platform, offers various viable preventive tools.
For instance, there is a Cloud WAF that is easy-to-use, fully automated, and packed with inventive prevention techniques. As it supports all the leading APIs, the protection delivered will be extensive and far-reaching.
In addition, there is a feature-rich API security solution offered that involves API monitoring. API threat detection, API prevention, and API testing facilities. Using this service, one can ensure that sensitive data, handled by APIs, is protected and risk-free from beginning to end.
Lastly, Wallarm offers GotestWAF, which is a very powerful security tool to test at-work WAF. It will help you find out the actual performance of your WAF and provide clear insights on threats detected by AppSec solutions.
All three solutions, when in place, ensure that sensitive cryptographic data is safe and sound.
Subscribe for the latest news