Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Complete Compromise of Kigen’s eUICC Java Card VM
Vulnerability Overview
Security Explorations of AG Security Research demonstrated a complete compromise of Kigen’s eUICC Java Card VM (Infineon SLC37 ESA1M2 on 32-bit ARM SecurCore SC300) by exploiting missing type-safety checks in the
getfield
andputfield
bytecodes. These instructions do not verify whether the operand is an object or an array, allowing an attacker to cast between array an...🔧 Technical Details
Java Card VM type-confusion: Missing type-safety checks in
getfield
/putfield
allow casting between object and array references. The overlap of an array’slength
field with object instance fields provides an arbitrary memory read/write primitive on the eUICC.SMS-PP OTA applet installation: By leveraging publicly known GSMA consumer certificate keys and the SMS-PP APDU sequence (e.g.,
80 CA DF 1F 00
to read firmware version), an at...🤖 Agent Actions
Added new page: src/generic-hacking/esim-javacard-exploitation.md
Key points added:
• Detailed explanation of Java Card VM type-confusion in getfield/putfield leading to arbitrary read/write on eUICC
• Full OTA exploitation chain (SMS-PP LOAD/INSTALL, firmware check, memory leak, key theft, profile cloning)
• APDU examples, byte-code snippet and step-by-step workflow
• Description of the Basic Security Check (bsc) toolkit modules for automated detection/exploitation
• Mitigation guidance and quick pentest checklist
• References section with links to the original research and relevant specs
No existing HackTricks pages covered smart-card / eSIM topics, so a standalone file was created under generic-hacking.
✅ Review Checklist
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.
📚 Repository Maintenance
All .md files have been checked for proper formatting (headers, includes, etc.).