[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CADbNDXHY1=qTGbLNYeV2rzy9y+262AKxHaE=tWTrZ1xFM+Vyng@mail.gmail.com>
Date: Wed, 9 Jul 2025 10:28:06 +0200
From: Security Explorations <contact@...urity-explorations.com>
To: fulldisclosure@...lists.org
Subject: [FD] eSIM security research (GSMA eUICC compromise and certificate
theft)
Dear All,
We broke security of Kigen eUICC card with GSMA consumer certificates
installed into it.
The eUICC card makes it possible to install the so called eSIM profiles
into target chip. eSIM profiles are software representations of mobile
subscriptions. For many years such mobile subscriptions had a form of a
physical SIM card of various factors (SIM, microSIM, nonoSIM). With eSIM,
the subscription can come in a pure digital form (as a software bundle),
it can also carry Java Card applications.
According to Kigen:
1) eSIMs are "as secure and interoperable as SIM cards [...] thanks to
the multi-layered GSMA eSIM certification scheme that protects device
makers, device owners and mobile network operators (MNOs)"
2) "Kigen OS offers the highest level of logical security when employed
on any SIM form factor, including a secure enclave" and "Kigen SIM OS
features help differentiate, scale and grow revenues with zero compromise
security"
The hack proves that our research on Java Card from 2019 did matter.
Oracle indicated the vulnerabilities we reported to the company in 2019
were rather irrelevant (the company referred to them as "security concerns")
/ did not affect their production Java Card VM. These are now proved to be
real bugs.
This is likely the first successful public hack against:
- consumer GSMA eUICC
- Kigen eSIM (Kigen press releases and web pages implicate over 2 billion
SIMs enabled by Kigen secure SIM OS)
- EAL certified GSMA security chip (SLC37 chip based on 32-bit ARM SecurCore
SC300 processor from Infineon)
The attack against Kigen eUICC relies both on physical access to sample card
along knowledge of the keys used for malicious Java app installation. The
remote over-the-air (OTA) vector can't be excluded - our Proof of Concept
code mimics a malicious applet installation over OTA SMS-PP protocol (Short
Message Service Point to Point) on a target Kigen eUICC. In that context,
knowledge of the keys is a primary requirement for target card compromise.
The hack proves no security / isolation for the eSIM profile and Java apps
(no security for eUICC memory content).
It's worth to note that while this work builds on our past Java Card
research
from 2019 (along 25 years of Java hacking experience), it required
development
of some new exploitation techniques / know-how.
We hope the hack brings eSIM security along associated security risks to
the focus of mobile network operators (MNOs), vendors, security researchers
and security companies. This is important in the context of somewhat bold
security claims / overconfidence of eUICC vendors (vide leaf eUICC cert
valid for 100 years) and MNO assumptions pertaining to profile trust and
its storage in a tamper-proof security element (MNO profile integrity / no
compromise / no tampering assumed).
More information about the core issues, fixes and hack implications can be
found at project pages:
https://security-explorations.com/esim-security.html
Thank you.
Best Regards,
Adam Gowdiak
----------------------------------
Security Explorations -
AG Security Research Lab
https://security-explorations.com
----------------------------------
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/
Powered by blists - more mailing lists