logo

206 Security controls bypass or absence - Anti hooking


Description

The application does not have anti-hooking protections, allowing tools such as Frida to work in its execution.


Impact

- Evade security controls such as SSL pinning. - Intercept function calls and messages to alter the behavior of the application.


Recommendation

Enabling anti-hooking controls in the application.


Threat

Anonymous attacker from the Internet.


Expected Remediation Time

300 minutes.


Score 4.0

Default score using CVSS 4.0. It may change depending on the context of the src.

Base 4.0

  • Attack vector: P
  • Attack complexity: L
  • Attack Requirements: N
  • Privileges required: N
  • User interaction: N
  • Confidentiality (VC): L
  • Integrity (VI): L
  • Availability (VA): N
  • Confidentiality (SC): N
  • Integrity (SI): N
  • Availability (SA): N

Threat 4.0

  • Exploit maturity: X

Requirements


Last updated

2024/02/16