CyberSecurity news

FlagThis

@cyberalerts.io //
Cybersecurity researchers have uncovered critical vulnerabilities in Kigen's eSIM technology, potentially impacting billions of Internet of Things (IoT) devices and mobile networks worldwide. Security Explorations, a research lab, demonstrated that they could compromise Kigen's eUICC cards, a component essential for eSIM functionality. The attack allowed researchers to extract private encryption keys and download arbitrary eSIM profiles from major mobile network operators. This breach raises significant concerns about identity theft and the potential interception of communications for a vast number of connected devices.

The exploitation of these flaws builds upon prior Java Card research from 2019, which highlighted fundamental weaknesses in virtual machine implementations. Researchers were able to bypass security measures on the eUICC chip, which is designed to securely store and manage mobile carrier profiles. By exploiting type confusion vulnerabilities, they gained unauthorized access to the chip's memory, enabling the extraction of critical cryptographic keys like the private ECC key for GSMA certificates. This effectively undermined the trust model that underpins the entire eSIM ecosystem, as the eSIM profiles themselves and the Java applications stored on the chip were found to lack proper isolation or protection.

While Kigen has acknowledged the issue and deployed mitigations, including hardening bytecodes and tightening test profile rules, concerns remain regarding the root cause of the vulnerability. The GSMA TS.48 Generic Test Profile, versions 6.0 and earlier, has been identified as a contributing factor, allowing for the installation of unverified or malicious applets. Although the latest version of the GSMA standard addresses this, the existence of these fundamental flaws in widely deployed eSIM technology highlights the ongoing challenges in securing the rapidly expanding IoT landscape and the potential for widespread compromise if not adequately addressed.
Original img attribution: https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmlmCUYpPrcRQi8PGQi3ZQkGoYAdUHWhAuQnVYhuOrHjbQ1rH0RIUybfX2hU-sH-38NDjo1cNuy9qpy4YL5vVgbWADiQti1CSsyg5kdK0FEsCumRRPFW1h-rvrP-CdOaZgyIbMB-N3rzSRRNElVLspEdJ_pZrmkZ7km_2Q81dYQ9GwQ87Bt2JVqWyP-t0-/s728-rw-e365/esim.jpg
ImgSrc: blogger.googleu

Share: bluesky twitterx--v2 facebook--v1 threads


References :
  • Cyber Security News: New eSIM Hack Let Attackers Clobe your eSIM Profile Clone
  • securityaffairs.com: Experts uncover critical flaws in Kigen eSIM technology affecting billions
  • thehackernews.com: eSIM Vulnerability in Kigen's eUICC Cards Exposes Billions of IoT Devices to Malicious Attacks
Classification:
  • HashTags: #eSIM #Vulnerability #IoTsecurity
  • Company: Kigen
  • Target: IoT Devices
  • Attacker: Security Explorations
  • Product: eSIM
  • Feature: eSIM
  • Malware: eUICC Exploit
  • Type: Vulnerability
  • Severity: Major