lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CADbNDXHY1=qTGbLNYeV2rzy9y+262AKxHaE=tWTrZ1xFM+Vyng@mail.gmail.com>
Date: Wed, 9 Jul 2025 10:28:06 +0200
From: Security Explorations <contact@...urity-explorations.com>
To: fulldisclosure@...lists.org
Subject: [FD] eSIM security research (GSMA eUICC compromise and certificate
	theft)

Dear All,

We broke security of Kigen eUICC card with GSMA consumer certificates
installed into it.

The eUICC card makes it possible to install the so called eSIM profiles
into target chip. eSIM profiles are software representations of mobile
subscriptions. For many years such mobile subscriptions had a form of a
physical SIM card of various factors (SIM, microSIM, nonoSIM). With eSIM,
the subscription can come in a pure digital form (as a software bundle),
it can also carry Java Card applications.

According to Kigen:
1) eSIMs are "as secure and interoperable as SIM cards [...] thanks to
   the multi-layered GSMA eSIM certification scheme that protects device
   makers, device owners and mobile network operators (MNOs)"

2) "Kigen OS offers the highest level of logical security when employed
   on any SIM form factor, including a secure enclave" and "Kigen SIM OS
   features help differentiate, scale and grow revenues with zero compromise
   security"

The hack proves that our research on Java Card from 2019 did matter.
Oracle indicated the vulnerabilities we reported to the company in 2019
were rather irrelevant (the company referred to them as "security concerns")
/ did not affect their production Java Card VM. These are now proved to be
real bugs.

This is likely the first successful public hack against:
- consumer GSMA eUICC
- Kigen eSIM (Kigen press releases and web pages implicate over 2 billion
  SIMs enabled by Kigen secure SIM OS)
- EAL certified GSMA security chip (SLC37 chip based on 32-bit ARM SecurCore
  SC300 processor from Infineon)

The attack against Kigen eUICC relies both on physical access to sample card
along knowledge of the keys used for malicious Java app installation. The
remote over-the-air (OTA) vector can't be excluded - our Proof of Concept
code mimics a malicious applet installation over OTA SMS-PP protocol (Short
Message Service Point to Point) on a target Kigen eUICC. In that context,
knowledge of the keys is a primary requirement for target card compromise.

The hack proves no security / isolation for the eSIM profile and Java apps
(no security for eUICC memory content).

It's worth to note that while this work builds on our past Java Card
research
from 2019 (along 25 years of Java hacking experience), it required
development
of some new exploitation techniques / know-how.

We hope the hack brings eSIM security along associated security risks to
the focus of mobile network operators (MNOs), vendors, security researchers
and security companies. This is important in the context of somewhat bold
security claims / overconfidence of eUICC vendors (vide leaf eUICC cert
valid for 100 years) and MNO assumptions pertaining to profile trust and
its storage in a tamper-proof security element (MNO profile integrity / no
compromise / no tampering assumed).

More information about the core issues, fixes and hack implications can be
found at project pages:

https://security-explorations.com/esim-security.html

Thank you.

Best Regards,
Adam Gowdiak

----------------------------------
Security Explorations -
AG Security Research Lab
https://security-explorations.com
----------------------------------
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ