Kigen’s eUICC Crisis: Backdoor or Bug? The Security Drama Unfolds!
Kigen’s eUICC cards face a new security hiccup, where “custom backdoor” sounds like an exclusive club for bugs! Whether it’s a sneaky firmware issue or a secret agent backdoor, Kigen’s response is still MIA. Security Explorations is on the case, urging customers to double-check those secret keys!

Hot Take:
When it comes to Kigen’s eUICC cards, it seems like their security measures are like a cheese grater trying to hold soup. With the potential for a custom backdoor or FW update bug, one can’t help but wonder if Kigen’s security team is conducting a thrilling game of ‘guess the exploit’ instead of safeguarding information. It’s a bold move to ignore a security report, Kigen, but hey, at least it keeps things exciting for all involved!
Key Points:
- Kigen’s eUICC cards have a new security issue potentially involving a custom backdoor or a firmware update bug.
- Security Explorations reported this issue to Kigen, but have yet to receive a response.
- The problem could lead to arbitrary eUICC firmware changes, posing a significant security risk.
- Attackers need physical access or knowledge of OTA/RFM keys for exploitation.
- Security Explorations advises Kigen customers to request information on embedded secret/shared keys.
Already a member? Log in here