Content
@
https://warpcast.com/~/channel/cybersecurity
0 reply
0 recast
0 reaction
Officer’s Notes
@officercia
eSIM: Cloning, Interception, and Java Card System Vulnerability Researchers from Security Explorations have reported a critical vulnerability in eSIM chips from Kigen, which allowed full access to secret keys, cloning of eSIM profiles, and interception of calls and messages without the owner's knowledge.
2 replies
1 recast
9 reactions
Officer’s Notes
@officercia
This is the first publicly documented case in history of a successful hack of a consumer eUICC chip certified to the EAL4+ standard and approved by GSMA. The issue lies in the architecture of the Java Card VM used in Kigen chips. It allows the installation and execution of Java applets on eSIMs but does not verify their security at the bytecode level.
1 reply
0 recast
1 reaction
Dean Pierce 👨💻🌎🌍
@deanpierce.eth
You should post sources 😄 Here's what I found: https://thehackernews.com/2025/07/esim-vulnerability-in-kigens-euicc.html?m=1 https://security-explorations.com/esim-security.html
1 reply
0 recast
1 reaction