Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Atlas collaboration reveals the rare Higgs-Boson Decay

Researchers produce green hydrogen from sugar cane

UK electric vehicle manufacturing will supply fuel with an investment of £2.5 billion

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » The ESIM vulnerability in Kigen’s EUICC card exposes billions of IoT devices to malicious attacks
Identity

The ESIM vulnerability in Kigen’s EUICC card exposes billions of IoT devices to malicious attacks

userBy userJuly 14, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 14, 2025Ravi LakshmananMobile Security/Vulnerability

ESIM vulnerability

Cybersecurity researchers have discovered new hacking techniques that take advantage of the weaknesses of ESIM technology used in modern smartphones and put users at serious risk.

This issue affects Kigen EUICC cards. According to the Irish company’s website, as of December 2020, more than 1 billion SIMs are enabled for IoT devices.

The findings come from Security Explorations, the laboratory of AG Security Research Company. Kigen awarded the company a $30,000 reward for reporting.

An ESIM, or embedded SIM, is a digital SIM card embedded directly into the device as software installed as software on an embedded Universal Integrated Circuit Card (EUICC) chip.

Cybersecurity

ESIM allows users to activate mobile phone plans from carriers without the need for a physical SIM card. The EUICC software provides the ability to change the operator profile, remote provisioning, and management of SIM profiles.

“The EUICC card allows you to install so-called ESIM profiles on the target chip,” Security Exploration said. “ESIM profiles are software representations for mobile subscriptions.”

According to an advisory published by Kigen, the vulnerability is rooted in the GSMA Ts.48 generic test profile, version 6.0 or earlier, which is said to be used in ESIM products for wireless compliance testing.

Specifically, this drawback allows for the installation of non-validated and potentially malicious applets. Released last month, GSMA Ts.48 V7.0 reduces the issue by limiting the use of test profiles. All other versions of the Ts.48 specification have been deprecated.

“Successful exploitation requires a specific combination of conditions. Attackers must first gain physical access to the target EUICC and use publicly known keys,” Kigen said. “This allows an attacker to place a malicious Javacard applet.”

Furthermore, the vulnerability may facilitate the extraction of Kigen EUICC ID certificates, which allows you to download any profile from a cleartext mobile network operator (MNO), access the secrets of the MNO and put it in any EUICC without flagging the MNO.

Security Explorations says the findings are based on their own previous research since 2019. This reveals that multiple security vulnerabilities in Oracle Java cards could pave the way for permanent backdoor deployment to cards. One flaw also affected Gemalto Sim, which relies on Java card technology.

These security flaws are exploited to “break the memory safety of the underlying Java card VMs” and can even achieve native code execution by fully accessing the memory of the card, breaking the applet firewall.

However, Oracle downplayed the potential impact and showed that “security concerns” would not affect the production of Java Card VMs. Security research shows that these “concerns” are now proven to be “real bugs.”

Cybersecurity

Attacks may sound outrageous to carry out, but on the contrary, they fall within the bounds of a capable nation-state group. It allows attackers to compromise on ESIM cards, deploy stealth backdoors, and effectively intercept all communications.

“Downloaded profiles can be potentially modified in such a way. Therefore, operators lose control of the profile (e.g. the ability to remote control/disable/disable). Operators can provide a completely incorrect view of the profile state.

“In our opinion, the ability of a single broken EUICC/single EUICC GSMA certificate to peer into any MNO’s ESIMS constitutes a weakness in the important ESIM architecture.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHow a “big beautiful bill” will affect transportation
Next Article CBI suspends £390k UK technical assistance fraud and arrests key operatives at Noida call centre
user
  • Website

Related Posts

CBI suspends £390k UK technical assistance fraud and arrests key operatives at Noida call centre

July 14, 2025

New Rowhammer Attack Variant Degrades AI Models on Nvidia GPUs

July 12, 2025

Over 600 laravel apps exposed to remote code execution due to app_keys leaked on github

July 12, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Atlas collaboration reveals the rare Higgs-Boson Decay

Researchers produce green hydrogen from sugar cane

UK electric vehicle manufacturing will supply fuel with an investment of £2.5 billion

CBI suspends £390k UK technical assistance fraud and arrests key operatives at Noida call centre

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

The Future of Process Automation is Here: Meet TwinH

Robots Play Football in Beijing: A Glimpse into China’s Ambitious AI Future

TwinH: A New Frontier in the Pursuit of Immortality?

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.