34
submitted 1 day ago by [email protected] to c/[email protected]
top 1 comments
sorted by: hot top new old
[-] [email protected] 15 points 1 day ago* (last edited 1 day ago)

It’s worth noting that while the Security Explorations project focused on Kigen products, eUICC/eSIM chips from several other vendors may be vulnerable to similar attacks as the underlying issue is related to a series of vulnerabilities found in Oracle’s Java Card technology.

The Java Card flaws were disclosed by Security Explorations in 2019, but Oracle and SIM card manufacturers using the technology downplayed their potential impact at the time.

In order to conduct an attack, the attacker needs temporary physical access to the device with the targeted eSIM. The goal is to extract a key that allows the installation of a malicious Java Card application.

this post was submitted on 11 Jul 2025
34 points (100.0% liked)

Cybersecurity

7789 readers
30 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities [email protected] [email protected] [email protected] [email protected] [email protected]

Notable mention to [email protected]

founded 2 years ago
MODERATORS