# This script will apply the patch for vulnerability mitigation in the Kigen ECu10.13 CardOS # The EIDs and the return code (see last APDU command) will be logged to file "patched_cards.txt" # Start with: ./pySim-shell.py -p0 --noprompt -e "bulk_script /home/user/sysmoEUICC1-patch-202507.script" echo "=======================================8<=======================================" >> patched_cards.txt echo Recording eUID of the card... select ADF.ISD-R > /dev/null get_eid >> patched_cards.txt echo Applying patch... reset apdu 00A4000C02ABCD --expect-sw 9000 apdu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expect-sw 9000 apdu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expect-sw 9000 echo Check if the patch has been correctly applied... apdu 00A4000C02ABCE --expect-sw 9000 > /dev/null apdu 00D600001D01454375313031336520250328CCFD4D39E1F60A7D29B0694957DC8A6C --expect-sw 9000 > /dev/null apdu 00B000001D --expect-sw 9000 --expect-resp 0245437531303133652025032800000000000000000000000000000000 >> patched_cards.txt