[<prev] [day] [month] [year] [list]
Message-ID: <CADbNDXGaxFrB9=ZkbZHr+BmmiFfeTuDfdhgiubKdsj3_yBeGNA@mail.gmail.com>
Date: Tue, 12 Aug 2025 10:01:43 +0200
From: Security Explorations <contact@...urity-explorations.com>
To: fulldisclosure@...lists.org
Subject: [FD] Kigen eUICC issue (custom backdoor vs. FW update bug)
Dear All,
On Jul 28, 2025 we provided Kigen with a report describing new security
issue potentially affecting company's eUICC cards. We did it regardless
of Kigen refusal to provide us with patches / patching instructions, so
that we could verify the content / quality of the fixes released by the
company for previously reported JavaCard issues [1] (more on that and
patching formula proposed by the company can be found on eSIM project
pages).
While Kigen claims it "takes security issues extremely seriously and
welcomes feedback from security researchers to improve the security of
its services" [2], the company has not provided response / confirmation
of our report reception as of Aug 11, 2025 (Kigen CTO and media person
CC'ed to all messages).
Depending on the evaluation of the issue (custom backdoor vs. bug in FW
patching mechanism), this might constitute a base for some spec changes
at GSMA end.
SGP.22 specification leaves it up to the vendor how eUICC FW patching is
to be performed. This may lead to security issues if not done properly
(there is some potential the new report will highlight the need for spec
changes of which GSMA was notified on Jul 29, 2025).
The new issue seems more dangerous when compared to the initial JavaCard
exploit due to the potential for arbitrary eUICC firmware change. There
is no requirement for a malicious JavaCard app installation / presence.
Our analysis indicates that an attacker just needs physical access to
target card (over-the-wire exploit scenario) or to know the OTA / RFM
keys (over-the-air exploit). The new issue relies on secret keys embedded
in eUICC firmware, which cannot be deemed secret taking into account
their symmetric nature and JavaCard exploit leading to complete card
compromise.
We provided Kigen with a sample exploitation / backdoor implementation
scenario (an idea) too (an approach for arbitrary FW patching making it
possible to return prv ECC key as a response to given GET DATA APDU).
It's worth to note that beside some incosistencies / confusion carried
in Kigen security bulletin [3] (confusing root cause) and with respect
to CVSS score provided by the company (implicating physical exploit
vector only even though we relied on simulated OTA), we also found out
that the vulnerability impact information provided by Kigen was not
correct. More specifically, we verified that cards with "ECu1029"
version string are also prone to JavaCard issues (Kigen indicated that
"ECu10.13" string identifies vulnerable eUICC card).
Due to inability to verify / confirm reported issue with the company
we suggest Kigen customers to request information pertaining to all
secret / shared keys embedded in Kigen eUICC FW and ECASD domain
(those keys that are out of customers control in particular, ECASD
key ver 7f [4]).
Thank you.
Best Regards,
Adam Gowdiak
----------------------------------
Security Explorations -
AG Security Research Lab
https://security-explorations.com
----------------------------------
[1] eSIM security
https://security-explorations.com/esim-security.html
[2] Kigen Security Center
https://kigen.com/company/policies/security-center/
[3] Kigen Security Bulletin, Jul 2025
https://kigen.com/company/policies/security-center/security-bulletin-kgnsb-07-2025/
[4] Sample Kigen eUICC secret keys dump
https://security-explorations.com/samples/kigen_euicc_keys_dump.txt
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/
Powered by blists - more mailing lists