On NXP MIFARE Ultralight and NTAG cards, an attacker can interrupt a write operation (aka conduct a "tear off" attack) over RFID to bypass a Monotonic Counter protection mechanism. The impact depends on how the anti tear-off feature is used in specific applications such as public transportation, physical access control, etc.
2021-06-06T16:15:07.407
2024-11-21T06:09:42.567
Modified
CVSSv3.1: 4.2 (MEDIUM)
AV:L/AC:M/Au:N/C:N/I:P/A:N
3.4
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | nxp | mifare_ultralight_ev1_firmware | - | Yes |
Hardware | nxp | mifare_ultralight_ev1 | - | No |
Operating System | nxp | mifare_ultralight_c_firmware | - | Yes |
Hardware | nxp | mifare_ultralight_c | - | No |
Operating System | nxp | mifare_ultralight_nano_firmware | - | Yes |
Hardware | nxp | mifare_ultralight_nano | - | No |
Operating System | nxp | ntag_210_firmware | - | Yes |
Hardware | nxp | ntag_210 | - | No |
Operating System | nxp | ntag_212_firmware | - | Yes |
Hardware | nxp | ntag_212 | - | No |
Operating System | nxp | ntag_213_firmware | - | Yes |
Hardware | nxp | ntag_213 | - | No |
Operating System | nxp | ntag_215_firmware | - | Yes |
Hardware | nxp | ntag_215 | - | No |
Operating System | nxp | ntag_216_firmware | - | Yes |
Hardware | nxp | ntag_216 | - | No |