Name Lifting credential(s)/key material embedded in client distributions (thick or thin)
Summary An attacker examines a target application's code or configuration files to find credential or key material that has been embedded within the application or its files. Many services require authentication with their users for the various purposes including billing, access control or attribution. Some client applications store the user's authentication credentials or keys to accelerate the login process. Some clients may have built-in keys or credentials (in which case the server is authenticating with the client, rather than the user). If the attacker is able to locate where this information is stored, they may be able to retrieve these credentials. The attacker could then use these stolen credentials to impersonate the user or client, respectively, in interactions with the service or use stolen keys to eavesdrop on nominally secure communications between the client and server.
Prerequisites The target application must save keys or credential information. Many applications allow users to store authentication information as an option.
Solutions Design: When possible, don't store credentials information on the client side Implementation: Don't store clear text or obfuscated credential information (or cryptographic keys) on the client side; use strong encryption to store any credentials related information
Related Weaknesses
CWE ID Description
CWE-259 Use of Hard-coded Password
CWE-522 Insufficiently Protected Credentials
Back to Top