Content
@
https://warpcast.com/~/channel/cybersecurity
0 reply
0 recast
0 reaction
Officer’s Notes
@officercia
eSIM: Cloning, Interception, and Java Card System Vulnerability Researchers from Security Explorations have reported a critical vulnerability in eSIM chips from Kigen, which allowed full access to secret keys, cloning of eSIM profiles, and interception of calls and messages without the owner's knowledge.
2 replies
1 recast
10 reactions
Officer’s Notes
@officercia
This is the first publicly documented case in history of a successful hack of a consumer eUICC chip certified to the EAL4+ standard and approved by GSMA. The issue lies in the architecture of the Java Card VM used in Kigen chips. It allows the installation and execution of Java applets on eSIMs but does not verify their security at the bytecode level.
1 reply
0 recast
1 reaction
Officer’s Notes
@officercia
Through the SMS-PP protocol (service SMS), an attacker can send a malicious applet to the device and gain access to the memory where private ECC keys are stored. This enables: ⦁ Forging the GSMA certificate (Generic Test Profile), ⦁ Uploading mobile operator eSIM profiles (AT&T, Vodafone, O2, Orange, etc.) in plain text, ⦁ Cloning the eSIM to another device.
1 reply
0 recast
0 reaction