Charts
DataOn-chain
VIP
Market Cap
API
Rankings
CoinOSNew
CoinClaw🦞
Language
  • 简体中文
  • 繁体中文
  • English
Leader in global market data applications, committed to providing valuable information more efficiently.

Features

  • Real-time Data
  • Special Features
  • AI Grid

Services

  • News
  • Open Data(API)
  • Institutional Services

Downloads

  • Desktop
  • Android
  • iOS

Contact Us

  • Chat Room
  • Business Email
  • Official Email
  • Official Verification

Join Community

  • Telegram
  • Twitter
  • Discord

© Copyright 2013-2026. All rights reserved.

简体繁體English
|Legacy
BTCBTC
💲70923.82
-
2.95%
ETHETH
💲2079.10
-
4.88%
SOLSOL
💲87.32
-
4.54%
TRUMPTRUMP
💲3.99
-
6.99%
USDCUSDC
💲0.9998
-
0%
XRPXRP
💲1.39
-
3.47%

Vladimir S. | Officer's Notes
Vladimir S. | Officer's Notes|7月 19, 2025 21:12
eSIM: Cloning, Interception, and Java Card System Vulnerability Researchers from Security Explorations have reported a critical vulnerability in eSIM chips from Kigen, which allowed full access to secret keys, cloning of eSIM profiles, and interception of calls and messages without the owner's knowledge. This is the first publicly documented case in history of a successful hack of a consumer eUICC chip certified to the EAL4+ standard and approved by GSMA. The issue lies in the architecture of the Java Card VM used in Kigen chips. It allows the installation and execution of Java applets on eSIMs but does not verify their security at the bytecode level. Through the SMS-PP protocol (service SMS), an attacker can send a malicious applet to the device and gain access to the memory where private ECC keys are stored. This enables: ⦁ Forging the GSMA certificate (Generic Test Profile), ⦁ Uploading mobile operator eSIM profiles (AT&T, Vodafone, O2, Orange, etc.) in plain text, ⦁ Cloning the eSIM to another device. Attack Demonstration: Cloning an Orange Profile. Researchers demonstrated the attack in the real network of Orange Poland: 🕸 Two phones used the same eSIM profile, 🕸 The second phone completely intercepted calls and SMS, 🕸 The original owner noticed nothing — the eSIM operation appeared unchanged. Kigen chips were certified to EAL4+, GSMA SGP.22 specifications, and secured by Infineon SecurCore SC300. However, even such "rock-solid" security did not protect against the logical vulnerability in Java Card. Over 2 billion devices are potentially vulnerable — smartphones, IoT, cars, and industrial systems. The threat affects all eSIM manufacturers using Java Card without strict code validation. Attack Capabilities: 🕸 Interception of communications, 🕸 Hacking two-factor authentication, 🕸 Remote backdoor implantation, 🕸 "Bricking" of chips. Kigen has released a patch and updated the specification (GSMA TS.48 v7.0), Added protections include: prohibition of third-party applet installation, RAM protection, and key randomization. The vulnerability received a CVSS score of 6.7. Researchers were awarded 30,000 by GSMA for identifying the issue. This case is not just a bug in one chip but a wake-up call for the entire industry. If the Java Card architecture remains vulnerable, any eSIM chip could become an entry point for cyberattacks. Even having certifications and closed specifications does not guarantee security.(Vladimir S. | Officer's Notes)
Mentioned
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

Timeline

8月 09, 05:02【Web3 team lured cloning of malicious code under the pretext of interviews】
8月 09, 04:30【Be wary of malicious code and backdoor repositories】
7月 16, 18:43【Sensay allows the creation of powerful AI agents】
7月 09, 03:05【CVE-225-48384 vulnerability affects remote code execution in Git】
6月 27, 20:33【Unbounded Prover Node Mining Nanny level Teaching】

HotFlash

|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

APP
Windows
Mac

X

Telegram

Facebook

Reddit

CopyLink

Hot Reads