Platform Usage / Mach-O Encrypted

Mobile App


Mach-O encrypted is a type of IT vulnerability that occurs when an application in the Mobile App platform is not properly secured and can be exploited by malicious actors. This vulnerability is classified as CWE-732 under the Common Weakness Enumeration (CWE) directory and is listed as "Insecure Cryptographic Storage" in the OWASP Testing Guide. This vulnerability makes it possible for attackers to gain access to the application's data and resources, potentially leading to data theft, data manipulation, and more.


This vulnerability can have a severe impact on the security of the application and its users. An attacker with access to the application's internal data could use it to steal sensitive information, manipulate data, or even execute malicious code. Additionally, the application may become vulnerable to other types of attacks, such as Denial of Service (DoS) and Distributed Denial of Service (DDoS).


The solution to this vulnerability is to properly secure the application by using strong encryption algorithms and keeping the application up-to-date with the latest security patches. Additionally, the application should be tested regularly to ensure that any vulnerabilities are identified and resolved quickly.


An example of this vulnerability can be found in CVE-2018-11181, where malicious actors were able to exploit a vulnerability in the Mach-O encrypted file format used by the popular fitness tracking application Strava. The attackers were able to gain access to the application's internal data, allowing them to steal user information and manipulate data.

Curious? Convinced? Interested?

Arrange a no-obligation consultation with one of our product experts today.