Dark Mode

Settings

Capec-614 Detail

Rooting SIM Cards

Detailed Software Typical Severity: High

Parents: 186

Threats: T62

Description

SIM cards are the de facto trust anchor of mobile devices worldwide. The cards protect the mobile identity of subscribers, associate devices with phone numbers, and increasingly store payment credentials, for example in NFC- enabled phones with mobile wallets. This attack leverages over-the-air (OTA) updates deployed via cryptographically-secured SMS messages to deliver executable code to the SIM. By cracking the DES key, an attacker can send properly signed binary SMS messages to a device, which are treated as Java applets and are executed on the SIM. These applets are allowed to send SMS, change voicemail numbers, and query the phone location, among many other predefined functions. These capabilities alone provide plenty of potential for abuse.

Not present

External ID Source Link Description
CAPEC-614 capec https://capec.mitre.org/data/definitions/614.html
CWE-327 cwe http://cwe.mitre.org/data/definitions/327.html
REF-486 reference_from_CAPEC https://srlabs.de/rooting-sim-cards/ Karsten Nohl, Rooting SIM Cards, Security Research Labs

Not present

  1. A SIM card that relies on the DES cipher.

Not present

Medium
This is a sophisticated attack, but detailed techniques are published in open literature.
Integrity Confidentiality
Execute Unauthorized Commands Execute Unauthorized Commands

Not present