CAPEC-614: Rooting SIM Cards

Detailed Draft 严重程度: High

CAPEC版本: 3.9

更新日期: 2023-01-24

攻击模式描述

SIM cards are the de facto trust anchor of mobile devices worldwide. The cards protect the mobile identity of subscribers, associate devices with phone numbers, and increasingly store payment credentials, for example in NFC-enabled phones with mobile wallets. This attack leverages over-the-air (OTA) updates deployed via cryptographically-secured SMS messages to deliver executable code to the SIM. By cracking the DES key, an attacker can send properly signed binary SMS messages to a device, which are treated as Java applets and are executed on the SIM. These applets are allowed to send SMS, change voicemail numbers, and query the phone location, among many other predefined functions. These capabilities alone provide plenty of potential for abuse.

前提条件

  • A SIM card that relies on the DES cipher.

所需技能

Medium This is a sophisticated attack, but detailed techniques are published in open literature.

后果影响

影响范围: Confidentiality Integrity

技术影响: Execute Unauthorized Commands

缓解措施

Upgrade the SIM card to use the state-of-the-art AES or the somewhat outdated 3DES algorithm for OTA.

关键信息

CAPEC ID: CAPEC-614

抽象级别: Detailed

状态: Draft

典型严重程度: High

相关攻击模式
相关CWE弱点