If operators need to re-programme your SIM card to add roaming or other capabilities, the re-programming is done remotely via an SMS in what is called over-the-air programming. Accessing the SIM requires the telco knows its encryption key, and this was precisely what Nohl was able to do. In theory if Nohl was able to achieve this, then cyber-crims should also be able to do so, albeit for more nefarious purposes.
Fortunately Kiwi telcos are aware of the issue.
Telecom New Zealand spokesperson, Vicky Gray says "We are aware of this issue. Telecom takes our customers' security extremely seriously as we do with all issues of this nature and we are working with our partners and suppliers to investigate the relevance - if any - for Telecom customers." Likewise Vodafone also stated they are aware of the issue and are also taking it seriously.
In isolation the encryption flaw uncovered by Nohl may be concerning, but things get even more interesting thanks to a second vulnerability also uncovered by Nohl.
Bizarrely this second flaw isn't related to the encryption key vulnerability, but allows hackers to exploit how a SIM card manages code to gain an unprecedented amount of control over the phone. The hack works because a hacker could give the SIM card a command it isn't able to execute which could ultimately result in malicious code gaining full access to all the SIM cards resources.
As alarming as both vulnerabilities sound, the good news is that it should take cyber-crims some time to develop exploits to take advantage of these flaws. By then it is hoped that mobile providers will have the vulnerability fixed.