eSIM Hack Allows for Cloning, Spying  - SecurityWeek (www.securityweek.com)
from kid@sh.itjust.works to cybersecurity@sh.itjust.works on 11 Jul 11:42
https://sh.itjust.works/post/41955238

#cybersecurity

threaded - newest

higgsboson@dubvee.org on 11 Jul 12:46 collapse

It’s worth noting that while the Security Explorations project focused on Kigen products, eUICC/eSIM chips from several other vendors may be vulnerable to similar attacks as the underlying issue is related to a series of vulnerabilities found in Oracle’s Java Card technology.

The Java Card flaws were disclosed by Security Explorations in 2019, but Oracle and SIM card manufacturers using the technology downplayed their potential impact at the time.

In order to conduct an attack, the attacker needs temporary physical access to the device with the targeted eSIM. The goal is to extract a key that allows the installation of a malicious Java Card application.