Conditions préalables
A SIM card that relies on the DES cipher.
Compétences requises
This is a sophisticated attack, but detailed techniques are published in open literature.
Atténuations
Upgrade the SIM card to use the state-of-the-art AES or the somewhat outdated 3DES algorithm for OTA.
Faiblesses connexes
CWE-ID |
Nom de la faiblesse |
|
Use of a Broken or Risky Cryptographic Algorithm The product uses a broken or risky cryptographic algorithm or protocol. |
Références
REF-486
Rooting SIM Cards
Karsten Nohl.
https://srlabs.de/rooting-sim-cards/
Soumission
Nom |
Organisation |
Date |
Date de publication |
CAPEC Content Team |
The MITRE Corporation |
2015-11-09 +00:00 |
|
Modifications
Nom |
Organisation |
Date |
Commentaire |
CAPEC Content Team |
The MITRE Corporation |
2018-07-31 +00:00 |
Updated Attack_Motivation-Consequences |
CAPEC Content Team |
The MITRE Corporation |
2019-09-30 +00:00 |
Updated Related_Attack_Patterns |
CAPEC Content Team |
The MITRE Corporation |
2022-02-22 +00:00 |
Updated Related_Attack_Patterns |
CAPEC Content Team |
The MITRE Corporation |
2022-09-29 +00:00 |
Updated Related_Attack_Patterns |