Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2021-33881


On NXP MIFARE Ultralight and NTAG cards, an attacker can interrupt a write operation (aka conduct a "tear off" attack) over RFID to bypass a Monotonic Counter protection mechanism. The impact depends on how the anti tear-off feature is used in specific applications such as public transportation, physical access control, etc.


Published

2021-06-06T16:15:07.407

Last Modified

2024-11-21T06:09:42.567

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 4.2 (MEDIUM)

CVSSv2 Vector

AV:L/AC:M/Au:N/C:N/I:P/A:N

  • Access Vector: LOCAL
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

3.4

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-863

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System nxp mifare_ultralight_ev1_firmware - Yes
Hardware nxp mifare_ultralight_ev1 - No
Operating System nxp mifare_ultralight_c_firmware - Yes
Hardware nxp mifare_ultralight_c - No
Operating System nxp mifare_ultralight_nano_firmware - Yes
Hardware nxp mifare_ultralight_nano - No
Operating System nxp ntag_210_firmware - Yes
Hardware nxp ntag_210 - No
Operating System nxp ntag_212_firmware - Yes
Hardware nxp ntag_212 - No
Operating System nxp ntag_213_firmware - Yes
Hardware nxp ntag_213 - No
Operating System nxp ntag_215_firmware - Yes
Hardware nxp ntag_215 - No
Operating System nxp ntag_216_firmware - Yes
Hardware nxp ntag_216 - No

References