Content pfp
Content
@
https://warpcast.com/~/channel/cybersecurity
0 reply
0 recast
0 reaction

Officer’s Notes pfp
Officer’s Notes
@officercia
eSIM: Cloning, Interception, and Java Card System Vulnerability Researchers from Security Explorations have reported a critical vulnerability in eSIM chips from Kigen, which allowed full access to secret keys, cloning of eSIM profiles, and interception of calls and messages without the owner's knowledge.
2 replies
1 recast
10 reactions

Officer’s Notes pfp
Officer’s Notes
@officercia
This is the first publicly documented case in history of a successful hack of a consumer eUICC chip certified to the EAL4+ standard and approved by GSMA. The issue lies in the architecture of the Java Card VM used in Kigen chips. It allows the installation and execution of Java applets on eSIMs but does not verify their security at the bytecode level.
1 reply
0 recast
1 reaction

Officer’s Notes pfp
Officer’s Notes
@officercia
Through the SMS-PP protocol (service SMS), an attacker can send a malicious applet to the device and gain access to the memory where private ECC keys are stored. This enables: ⦁ Forging the GSMA certificate (Generic Test Profile), ⦁ Uploading mobile operator eSIM profiles (AT&T, Vodafone, O2, Orange, etc.) in plain text, ⦁ Cloning the eSIM to another device.
1 reply
0 recast
0 reaction

Officer’s Notes pfp
Officer’s Notes
@officercia
Attack Demonstration: Cloning an Orange Profile. Researchers demonstrated the attack in the real network of Orange Poland: 🕸 Two phones used the same eSIM profile, 🕸 The second phone completely intercepted calls and SMS, 🕸 The original owner noticed nothing — the eSIM operation appeared unchanged. Kigen chips were certified to EAL4+, GSMA SGP.22 specifications, and secured by Infineon SecurCore SC300. However, even such "rock-solid" security did not protect against the logical vulnerability in Java Card.
1 reply
0 recast
0 reaction

Officer’s Notes pfp
Officer’s Notes
@officercia
Over 2 billion devices are potentially vulnerable — smartphones, IoT, cars, and industrial systems. The threat affects all eSIM manufacturers using Java Card without strict code validation. Attack Capabilities: 🕸 Interception of communications, 🕸 Hacking two-factor authentication, 🕸 Remote backdoor implantation, 🕸 "Bricking" of chips. Kigen has released a patch and updated the specification (GSMA TS.48 v7.0), Added protections include: prohibition of third-party applet installation, RAM protection, and key randomization. The vulnerability received a CVSS score of 6.7. Researchers were awarded $30,000 by GSMA for identifying the issue. This case is not just a bug in one chip but a wake-up call for the entire industry. If the Java Card architecture remains vulnerable, any eSIM chip could become an entry point for cyberattacks. Even having certifications and closed specifications does not guarantee security.
1 reply
0 recast
0 reaction

Officer’s Notes pfp
Officer’s Notes
@officercia
Source https://securityaffairs.com/179894/security/experts-uncover-critical-flaws-in-kigen-esim-technology-affecting-billions.html?amp
0 reply
0 recast
1 reaction