48
Successful exploitation requires a combination of specific conditions. An attacker must first gain physical access to a target eUICC and use publicly known keys," Kigen said.
it goes without saying.... physical access pretty much guarantees trouble