Dear All, On Jul 28, 2025 we provided Kigen with a report describing new security issue potentially affecting company's eUICC cards. We did it regardless of Kigen refusal to provide us with patches / patching instructions, so that we could verify the content / quality of the fixes released by the company for previously reported JavaCard issues [1] (more on that and patching formula proposed by the company can be found on eSIM project pages). While Kigen claims it "takes security issues extremely seriously and welcomes feedback from security researchers to improve the security of its services" [2], the company has not provided response / confirmation of our report reception as of Aug 11, 2025 (Kigen CTO and media person CC'ed to all messages). Depending on the evaluation of the issue (custom backdoor vs. bug in FW patching mechanism), this might constitute a base for some spec changes at GSMA end. SGP.22 specification leaves it up to the vendor how eUICC FW patching is to be performed. This may lead to security issues if not done properly (there is some potential the new report will highlight the need for spec changes of which GSMA was notified on Jul 29, 2025). The new issue seems more dangerous when compared to the initial JavaCard exploit due to the potential for arbitrary eUICC firmware change. There is no requirement for a malicious JavaCard app installation / presence. Our analysis indicates that an attacker just needs physical access to target card (over-the-wire exploit scenario) or to know the OTA / RFM keys (over-the-air exploit). The new issue relies on secret keys embedded in eUICC firmware, which cannot be deemed secret taking into account their symmetric nature and JavaCard exploit leading to complete card compromise. We provided Kigen with a sample exploitation / backdoor implementation scenario (an idea) too (an approach for arbitrary FW patching making it possible to return prv ECC key as a response to given GET DATA APDU). It's worth to note that beside some incosistencies / confusion carried in Kigen security bulletin [3] (confusing root cause) and with respect to CVSS score provided by the company (implicating physical exploit vector only even though we relied on simulated OTA), we also found out that the vulnerability impact information provided by Kigen was not correct. More specifically, we verified that cards with "ECu1029" version string are also prone to JavaCard issues (Kigen indicated that "ECu10.13" string identifies vulnerable eUICC card). Due to inability to verify / confirm reported issue with the company we suggest Kigen customers to request information pertaining to all secret / shared keys embedded in Kigen eUICC FW and ECASD domain (those keys that are out of customers control in particular, ECASD key ver 7f [4]). Thank you. Best Regards, Adam Gowdiak ---------------------------------- Security Explorations - AG Security Research Lab https://security-explorations.com ---------------------------------- [1] eSIM security https://security-explorations.com/esim-security.html [2] Kigen Security Center https://kigen.com/company/policies/security-center/ [3] Kigen Security Bulletin, Jul 2025 https://kigen.com/company/policies/security-center/security-bulletin-kgnsb-07-2025/ [4] Sample Kigen eUICC secret keys dump https://security-explorations.com/samples/kigen_euicc_keys_dump.txt