Security Analysis of the Consumer Remote SIM Provisioning Protocol #1
Replies: 10 comments
-
|
SIM(Subscriber Identity Module) is the sE(secure element) in a mobile phone or device that contains the identifiers and cryptographic credentials with which the UE(user equipment) authenticates the mobile subscriber to the MNO(Mobile Network Operator). Trust relations in RSP(Remote SIM Provisioning), both the SM-DP+ server and eUICC trust a common GSMA CI(certificate issuer). The RSP specification mainly considers a network adversary, that is, an attacker who can intercept and alter network communication between the RSP participants. |
Beta Was this translation helpful? Give feedback.
-
|
Beta Was this translation helpful? Give feedback.
-
|
Unwanted exposure or tampering of the SIM Profile or the credentials whithin it could lead to identity theft, billing fraud, eavesdropping and various privacy violations against the mobile subscriber. The SIM Profile contains security-critical information such as the IMSI(International mobile subscriber identity) and subscriber key Ki, which is shared between the UE(User Equipment) and the MNO. Thus, the secure delivery of the SIM profile to the mobile device is of the utmost importance. |
Beta Was this translation helpful? Give feedback.
-
SIM vs eSIMTraditionally, a SIM profile is provisioned to UICC(Universal Integrated Circuit Card) in the smart-card factory. Once, provisioned UICC is inserted in the UE for each mobile network subscription. "This new specification gives consumers the freedom to remotely connect devices, such as wearables, to a mobile network of their choice and continues to evolve the process of connecting new and innovative devices," Alex Sinclair, Chief Technology Officer, GSMA. Besides, the right of independent service providers to transmit commands of loading profiles to SIM-cards in the device has been amended and the possibility to store arrays of profiles in independent certified data centres (Subscriptions manager) has appeared. |
Beta Was this translation helpful? Give feedback.
-
Beta Was this translation helpful? Give feedback.
-
Certificates
StepsUser Intent
Profile Preparation
TLS Tunnel
Mutual Authentication
Profile Binding
Authenticated Key Exchange
Profile Download
|
Beta Was this translation helpful? Give feedback.
-
Assets that Require Protection
The Profile Contents are not modelled explicitly, contains other data, such as the subscriber and MNO identifiers,, Refer to this document for Profile Package Technical Specification. |
Beta Was this translation helpful? Give feedback.
-
|
Beta Was this translation helpful? Give feedback.
-
Verification Results1. Failure of the SM-DP+ Server Authentication
an adversary that has compromised an SM-DP+ server anywhere in the world can issue fake SIM profiles to any subscriber of any MNO — even if they have no business relation with the compromised server. Root cause, The client typically lacks a-priori knowledge of the server OID. This allows the adversary to sign message with any GSMA-issued server certificate.
2. Failure of Client Authentication and Profile Secrecy
3. Failure Due to Identity Fraud and Leaked Activation Code
In the attack, the adversary either impersonates a legitimate user when requesting a SIM profile from the MNO or obtains the victim’s activation code through leaks or software compromise.
This attack leads to:
In practice, this enables SIM swapping, where:
Root cause, there is insufficient verification of user identity during profile ordering and poor handling of activation codes.
Recommendation:
4. Failure Due to Unauthorized Order for an eUICC
In the attack, the adversary provides their own legitimate user identity to the MNO, but falsely claims a victim’s eUICC identifier.
This leads to:
The consequences are serious:
Root cause, the MNO does not verify that the user requesting the profile actually owns the eUICC identifier.
Similar attacks exist in the activation-code approach:
Mitigations:
5. Failure Due to Misbinding Without TLS
In the attack, the eUICC performs mutual authentication with what it believes to be the authorized SM-DP+ server.
This is not a classic man-in-the-middle or impersonation:
While secrets are not leaked in this misbinding, the practical result is:
Root cause, the protocol lacks binding checks for identity consistency across messages:
There is also a reverse misbinding vulnerability:
This second type of misbinding is mitigated somewhat:
Recommendations:
6. TLS Tunnel Dependency
Key Issues:
Root Causes:
Broader Concern:
Recommendation:
|
Beta Was this translation helpful? Give feedback.
-
Main vulnerabilities
|
Beta Was this translation helpful? Give feedback.

Uh oh!
There was an error while loading. Please reload this page.
-
Observation from this great paper
a) Define eSIM as "process"? , downloading SIM Profiles into a secure element in a mobile device,
Security of the process,
i) Depends unnecessarily on it being encapsulated in a TLS tunnel,
ii) Lack of pre-established identifiers means that a compromised download server anywhere in the world or a compromised secure element can be used for attacks against RSP between honest participants.
iii) Lack of reliable methods for verifying user intent can lead to serious security failures.
Beta Was this translation helpful? Give feedback.
All reactions