0 reply
0 recast
0 reaction
2 replies
1 recast
10 reactions
1 reply
0 recast
1 reaction
1 reply
0 recast
0 reaction
1 reply
0 recast
0 reaction
Over 2 billion devices are potentially vulnerable — smartphones, IoT, cars, and industrial systems.
The threat affects all eSIM manufacturers using Java Card without strict code validation.
Attack Capabilities:
🕸 Interception of communications,
🕸 Hacking two-factor authentication,
🕸 Remote backdoor implantation,
🕸 "Bricking" of chips.
Kigen has released a patch and updated the specification (GSMA TS.48 v7.0),
Added protections include: prohibition of third-party applet installation, RAM protection, and key randomization.
The vulnerability received a CVSS score of 6.7.
Researchers were awarded $30,000 by GSMA for identifying the issue.
This case is not just a bug in one chip but a wake-up call for the entire industry. If the Java Card architecture remains vulnerable, any eSIM chip could become an entry point for cyberattacks. Even having certifications and closed specifications does not guarantee security. 1 reply
0 recast
0 reaction
0 reply
0 recast
1 reaction