Security controls bypass or absence - Emulator
Description
The application does not have a control that detects if it is being used in an emulator, allowing a wider surface for reverse engineering.
Impact
Apply reverse engineer to the application.
Recommendation
Implement recommended security controls for mobile applications.
Threat
Anonymous attacker from the Internet.
Expected Remediation Time
⏱️ 120 minutes.
Requirements
062 - Define standard configurations266 - Disable insecure functionalities273 - Define a fixed security suiteFixes