🎄 Join our Annual Holiday wargame and win prizes!


Insecure Biometric Authentication

Insecure implementation of biometric authentication in mobile applications can expose users to significant security risks. Biometric authentication, such as fingerprint, facial recognition, or iris scanning, is often considered secure due to its reliance on unique physical attributes. However, improper integration or flawed implementation can lead to vulnerabilities, including bypassing authentication, unauthorised access, or leakage of sensitive biometric data. These vulnerabilities often stem from weak storage mechanisms, lack of secure communication channels, or insufficient fallback mechanisms.

Remediation

  • Use platform-provided APIs (e.g., Android BiometricPrompt or iOS LocalAuthentication) to handle biometric authentication securely and avoid custom implementations.
  • Store biometric templates securely using secure hardware mechanisms, such as Trusted Execution Environment (TEE) or Secure Enclave, to prevent tampering or leakage.
  • Encrypt biometric data and its metadata using strong encryption standards, such as AES-256.
  • Perform biometric verification entirely on-device to minimise exposure to external threats.
  • Implement spoof detection techniques, such as liveness detection, to reduce the risk of biometric spoofing attacks.
  • Log and monitor authentication attempts to detect anomalies, such as repeated failed biometric matches.

Metadata

  • Severity: medium
  • Slug: insecure-biometric-authentication

OWASP

  • M3:2024: Insecure Authentication Authorization

Available Labs

Open Java labs in SecDim Play for this vulnerability.

Deco line
Deco line

Play AppSec WarGames

Want to skill-up in secure coding and AppSec? Try SecDim Wargames to learn how to find, hack and fix security vulnerabilities inspired by real-world incidents.

Deco line
Deco line

Got a comment?

Join our secure coding and AppSec community. A discussion board to share and discuss all aspects of secure programming, AppSec, DevSecOps, fuzzing, cloudsec, AIsec code review, and more.

Read more