Cybersecurity Threats to eSIM

A critical vulnerability has been discovered in the GSMA TS.48 Generic Test Profile versions 6.0 and earlier, commonly used in the eSIM industry for radio compliance testing. This flaw enables attackers with physical access to an embedded Universal Integrated Circuit Card (eUICC) to exploit publicly known keys, allowing the installation of unverified and potentially malicious JavaCard applets.

Cybersecurity Threats to eSIMCybersecurity Threats to eSIM

eSIM Vulnerability Exposed
The exploit requires physical access to the device, activation of the test profile, and the use of exposed keys to bypass standard verification processes. Although the TS.48 profile is meant for controlled testing environments, its presence in deployed devices raises significant security concerns.

Cybersecurity Threats to eSIMCybersecurity Threats to eSIM

Successful exploitation could lead to unauthorized access to cellular network credentials, interception of communications, or even complete eSIM takeover, mimicking the cloning of physical SIM cards but with greater stealth due to the embedded nature of eSIMs.


"NPAV recommends home users and organizations to maintain strong, up-to-date cybersecurity measures. Install NPAV on your desktop, laptop, and mobile devices to ensure world-class protection against fraud, malware, and ransomware attacks.

Choose NPAV and be a part of our mission to make the digital world safer for everyone."