
Vladimir S. | Officer's Notes|Jul 19, 2025 21:12
eSIM: Cloning, Interception, and Java Card System Vulnerability
Researchers from Security Explorations have reported a critical vulnerability in eSIM chips from Kigen, which allowed full access to secret keys, cloning of eSIM profiles, and interception of calls and messages without the owner's knowledge.
This is the first publicly documented case in history of a successful hack of a consumer eUICC chip certified to the EAL4+ standard and approved by GSMA.
The issue lies in the architecture of the Java Card VM used in Kigen chips. It allows the installation and execution of Java applets on eSIMs but does not verify their security at the bytecode level.
Through the SMS-PP protocol (service SMS), an attacker can send a malicious applet to the device and gain access to the memory where private ECC keys are stored. This enables:
⦁ Forging the GSMA certificate (Generic Test Profile),
⦁ Uploading mobile operator eSIM profiles (AT&T, Vodafone, O2, Orange, etc.) in plain text,
⦁ Cloning the eSIM to another device.
Attack Demonstration: Cloning an Orange Profile. Researchers demonstrated the attack in the real network of Orange Poland:
🕸 Two phones used the same eSIM profile,
🕸 The second phone completely intercepted calls and SMS,
🕸 The original owner noticed nothing — the eSIM operation appeared unchanged.
Kigen chips were certified to EAL4+, GSMA SGP.22 specifications, and secured by Infineon SecurCore SC300. However, even such "rock-solid" security did not protect against the logical vulnerability in Java Card.
Over 2 billion devices are potentially vulnerable — smartphones, IoT, cars, and industrial systems.
The threat affects all eSIM manufacturers using Java Card without strict code validation.
Attack Capabilities:
🕸 Interception of communications,
🕸 Hacking two-factor authentication,
🕸 Remote backdoor implantation,
🕸 "Bricking" of chips.
Kigen has released a patch and updated the specification (GSMA TS.48 v7.0),
Added protections include: prohibition of third-party applet installation, RAM protection, and key randomization.
The vulnerability received a CVSS score of 6.7.
Researchers were awarded 30,000 by GSMA for identifying the issue.
This case is not just a bug in one chip but a wake-up call for the entire industry. If the Java Card architecture remains vulnerable, any eSIM chip could become an entry point for cyberattacks. Even having certifications and closed specifications does not guarantee security.(Vladimir S. | Officer's Notes)
Share To
Timeline
HotFlash
APP
X
Telegram
CopyLink