Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

eSIM Vulnerability in Kigen’s eUICC Cards Exposes Billions of IoT Devices to Malicious Attacks

Posted on July 14, 2025July 14, 2025 By CWS

Jul 14, 2025Ravie LakshmananMobile Safety / Vulnerability
Cybersecurity researchers have found a brand new hacking approach that exploits weaknesses within the eSIM expertise utilized in fashionable smartphones, exposing customers to extreme dangers.
The problems influence the Kigen eUICC card. In accordance with the Irish firm’s web site, greater than two billion SIMs in IoT gadgets have been enabled as of December 2020.
The findings come from Safety Explorations, a analysis lab of AG Safety Analysis firm. Kigen awarded the corporate a $30,000 bounty for his or her report.
An eSIM, or embedded SIM, is a digital SIM card that is embedded immediately into a tool as software program put in onto an Embedded Common Built-in Circuit Card (eUICC) chip.

eSIMs enable customers to activate a mobile plan from a provider with out the necessity for a bodily SIM card. eUICC software program provides the power to vary operator profiles, distant provisioning, and administration of SIM profiles.
“The eUICC card makes it doable to put in the so-called eSIM profiles into the goal chip,” Safety Explorations mentioned. “eSIM profiles are software program representations of cellular subscriptions.”
In accordance with an advisory launched by Kigen, the vulnerability is rooted within the GSMA TS.48 Generic Take a look at Profile, variations 6.0 and earlier, which is alleged for use in eSIM merchandise for radio compliance testing.
Particularly, the shortcoming permits for the set up of non-verified, and probably malicious applets. GSMA TS.48 v7.0, launched final month, mitigates the issue by proscribing using the check profile. All different variations of the TS.48 specification have been deprecated.
“Profitable exploitation requires a mix of particular circumstances. An attacker should first achieve bodily entry to a goal eUICC and use publicly recognized keys,” Kigen mentioned. “This permits the attacker to put in a malicious JavaCard applet.”

Moreover, the vulnerability may facilitate the extraction of the Kigen eUICC identification certificates, thereby making it doable to obtain arbitrary profiles from cellular community operators (MNOs) in cleartext, entry MNO secrets and techniques, and tamper with profiles and put them into an arbitrary eUICC with out being flagged by MNO.
Safety Explorations mentioned the findings construct upon its personal prior analysis from 2019, which discovered a number of safety vulnerabilities in Oracle Java Card that would pave the way in which for the deployment of a persistent backdoor within the card. One of many flaws additionally impacted Gemalto SIM, which depends on the Java Card expertise.
These safety defects might be exploited to “break reminiscence security of the underlying Java Card VM” and achieve full entry to the cardboard’s reminiscence, break the applet firewall, and probably even obtain native code execution.
Nevertheless, Oracle downplayed the potential influence and indicated that the “safety considerations” didn’t have an effect on their manufacturing of Java Card VM. Safety Explorations mentioned these “considerations” have now been confirmed to be “actual bugs.”

The assaults would possibly sound prohibitive to execute, however, on the contrary, they’re nicely inside the attain of succesful nation-state teams. They might enable the attackers to compromise an eSIM card and deploy a stealthy backdoor, successfully intercepting all communications.
“The downloaded profile might be probably modified in such a manner, in order that the operator loses management over the profile (no capability for distant management / no capability to disable/invalidate it, and many others.), the operator might be supplied with a very false view of the profile state or all of its exercise might be topic to monitoring,” the corporate added.
“In our opinion, the power for a single damaged eUICC / single eUICC GSMA cert theft to peek into (obtain in plaintext) eSIMs of arbitrary MNO constitutes a big eSIM structure weak level.”

Discovered this text attention-grabbing? Comply with us on Twitter  and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:Attacks, Billions, Cards, Devices, eSIM, eUICC, Exposes, IoT, Kigens, Malicious, Vulnerability

Post navigation

Previous Post: Google Gemini for Workspace Vulnerability Lets Attackers Hide Malicious Scripts in Emails
Next Post: 10 Best Cyber Attack Maps

Related Posts

$50 Battering RAM Attack Breaks Intel and AMD Cloud Security Protections The Hacker News
U.S. Sanctions North Korean Andariel Hacker Behind Fraudulent IT Worker Scheme The Hacker News
Microsoft Sets Passkeys Default for New Accounts; 15 Billion Users Gain Passwordless Support The Hacker News
CISA Flags Adobe AEM Flaw with Perfect 10.0 Score — Already Under Active Attack The Hacker News
Five New Exploited Bugs Land in CISA’s Catalog — Oracle and Microsoft Among Targets The Hacker News
Single 8-Byte Write Shatters AMD’s SEV-SNP Confidential Computing The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • French Soccer Federation Hit by Cyberattack, Member Data Stolen
  • Hackers Registered 18,000 Holiday-Themed Domains Targeting ‘Christmas,’ ‘Black Friday,’ and ‘Flash Sale’
  • Why Organizations Are Turning to RPAM
  • In Other News: HashJack AI Browser Attack, Charming Kitten Leak, Hacker Unmasked
  • Handala Hacker Group Attacking Israeli High-Tech and Aerospace Professionals

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • French Soccer Federation Hit by Cyberattack, Member Data Stolen
  • Hackers Registered 18,000 Holiday-Themed Domains Targeting ‘Christmas,’ ‘Black Friday,’ and ‘Flash Sale’
  • Why Organizations Are Turning to RPAM
  • In Other News: HashJack AI Browser Attack, Charming Kitten Leak, Hacker Unmasked
  • Handala Hacker Group Attacking Israeli High-Tech and Aerospace Professionals

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark