[Simsec] CNTR high

Soiava soiavaq at gmail.com
Tue Sep 22 01:58:42 CEST 2020


*Hello,*
*I see this result from SIMTester:*

fuzzer: fuzzer14, TAR: SAT:505348, keyset: 5 - card responded with FETCH,
fetched_data =
D02781030113008202818305008B1A410005002143F500F610027100000B0A50534800000000000003,
response word: 9000
Proactive command (SEND SHORT MESSAGE) identified, details:
"410005002143F500F610027100000B0A50534800000000000003"; trying to handle
it..
fuzzer: fuzzer14, TAR: 505348, keyset: 5, PoR: 03, PoR CC: null -> CRITICAL
WEAKNESS FOUND

SIMTester has discovered following weaknesses:

The following TARs/keysets returned a valid response without any security:
TAR    keyset Response packets

505348      5 027100000B0A50534800000000000003

*The PoR is 03 = CNTR high*
*What is the weakness of my SIM card?*
*Which attack?*
*Simjacker (S at T) or something else?*

*Please answer me...*
*Thanks.*
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.srlabs.de/pipermail/simsec/attachments/20200922/114d739f/attachment.html>


More information about the Simsec mailing list