HomeVulnerabilityeSIM Vulnerability in Kigen's eUICC Playing cards Exposes Billions of IoT Units...

eSIM Vulnerability in Kigen’s eUICC Playing cards Exposes Billions of IoT Units to Malicious Attacks

Cybersecurity researchers have found a brand new hacking method that exploits weaknesses within the eSIM know-how utilized in trendy smartphones, exposing customers to extreme dangers.

The problems influence the Kigen eUICC card. In response to the Irish firm’s web site, greater than two billion SIMs in IoT units have been enabled as of December 2020.

The findings come from Safety Explorations, a analysis lab of AG Safety Analysis firm. Kigen awarded the corporate a $30,000 bounty for his or her report.

An eSIM, or embedded SIM, is a digital SIM card that is embedded immediately into a tool as software program put in onto an Embedded Common Built-in Circuit Card (eUICC) chip.

Cybersecurity

eSIMs enable customers to activate a mobile plan from a provider with out the necessity for a bodily SIM card. eUICC software program affords the power to vary operator profiles, distant provisioning, and administration of SIM profiles.

“The eUICC card makes it potential to put in the so-called eSIM profiles into the goal chip,” Safety Explorations mentioned. “eSIM profiles are software program representations of cellular subscriptions.”

See also  Citrix Netscaler flaw CVE-2025-6543 exploited to breach orgs

In response to an advisory launched by Kigen, the vulnerability is rooted within the GSMA TS.48 Generic Check Profile, variations 6.0 and earlier, which is alleged for use in eSIM merchandise for radio compliance testing.

Particularly, the shortcoming permits for the set up of non-verified, and probably malicious applets. GSMA TS.48 v7.0, launched final month, mitigates the issue by proscribing using the take a look at profile. All different variations of the TS.48 specification have been deprecated.

“Profitable exploitation requires a mix of particular circumstances. An attacker should first achieve bodily entry to a goal eUICC and use publicly recognized keys,” Kigen mentioned. “This permits the attacker to put in a malicious JavaCard applet.”

Moreover, the vulnerability may facilitate the extraction of the Kigen eUICC id certificates, thereby making it potential to obtain arbitrary profiles from cellular community operators (MNOs) in cleartext, entry MNO secrets and techniques, and tamper with profiles and put them into an arbitrary eUICC with out being flagged by MNO.

See also  Vital Cisco ISE Auth Bypass Flaw Impacts Cloud Deployments on AWS, Azure, and OCI

Safety Explorations mentioned the findings construct upon its personal prior analysis from 2019, which discovered a number of security vulnerabilities in Oracle Java Card that would pave the best way for the deployment of a persistent backdoor within the card. One of many flaws additionally impacted Gemalto SIM, which depends on the Java Card know-how.

These security defects might be exploited to “break reminiscence security of the underlying Java Card VM” and achieve full entry to the cardboard’s reminiscence, break the applet firewall, and probably even obtain native code execution.

Nonetheless, Oracle downplayed the potential influence and indicated that the “security considerations” didn’t have an effect on their manufacturing of Java Card VM. Safety Explorations mentioned these “considerations” have now been confirmed to be “actual bugs.”

Cybersecurity

The assaults may sound prohibitive to execute, however, on the contrary, they’re nicely throughout the attain of succesful nation-state teams. They may enable the attackers to compromise an eSIM card and deploy a stealthy backdoor, successfully intercepting all communications.

See also  Equifax Fined $13.5 Million Over 2017 Data Breach

“The downloaded profile might be probably modified in such a method, in order that the operator loses management over the profile (no capacity for distant management / no capacity to disable/invalidate it, and so on.), the operator might be supplied with a very false view of the profile state or all of its exercise might be topic to monitoring,” the corporate added.

“In our opinion, the power for a single damaged eUICC / single eUICC GSMA cert theft to peek into (obtain in plaintext) eSIMs of arbitrary MNO constitutes a major eSIM structure weak level.”

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular