On NXP MIFARE Ultralight and NTAG cards, an attacker can interrupt a write operation (aka conduct a "tear off" attack) over RFID to bypass a Monotonic Counter protection mechanism. The impact depends on how the anti tear-off feature is used in specific applications such as public transportation, physical access control, etc.
References
Link | Resource |
---|---|
https://blog.quarkslab.com/rfid-monotonic-counter-anti-tearing-defeated.html | Mitigation Third Party Advisory |
https://www.nxp.com/docs/en/application-note/AN11340.pdf | Vendor Advisory |
https://www.nxp.com/docs/en/application-note/AN13089.pdf | Vendor Advisory |
https://www.sstic.org/2021/presentation/eeprom_it_will_all_end_in_tears/ | Exploit Third Party Advisory |
https://blog.quarkslab.com/rfid-monotonic-counter-anti-tearing-defeated.html | Mitigation Third Party Advisory |
https://www.nxp.com/docs/en/application-note/AN11340.pdf | Vendor Advisory |
https://www.nxp.com/docs/en/application-note/AN13089.pdf | Vendor Advisory |
https://www.sstic.org/2021/presentation/eeprom_it_will_all_end_in_tears/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
History
21 Nov 2024, 06:09
Type | Values Removed | Values Added |
---|---|---|
References | () https://blog.quarkslab.com/rfid-monotonic-counter-anti-tearing-defeated.html - Mitigation, Third Party Advisory | |
References | () https://www.nxp.com/docs/en/application-note/AN11340.pdf - Vendor Advisory | |
References | () https://www.nxp.com/docs/en/application-note/AN13089.pdf - Vendor Advisory | |
References | () https://www.sstic.org/2021/presentation/eeprom_it_will_all_end_in_tears/ - Exploit, Third Party Advisory |
17 Jun 2021, 16:39
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:nxp:mifare_ultralight_ev1:-:*:*:*:*:*:*:* cpe:2.3:h:nxp:mifare_ultralight_nano:-:*:*:*:*:*:*:* cpe:2.3:h:nxp:ntag_210:-:*:*:*:*:*:*:* cpe:2.3:o:nxp:ntag_213_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:nxp:ntag_210_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:nxp:ntag_215:-:*:*:*:*:*:*:* cpe:2.3:h:nxp:ntag_216:-:*:*:*:*:*:*:* cpe:2.3:o:nxp:ntag_215_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:nxp:mifare_ultralight_nano_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:nxp:ntag_212_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:nxp:ntag_216_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:nxp:ntag_212:-:*:*:*:*:*:*:* cpe:2.3:o:nxp:mifare_ultralight_ev1_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:nxp:mifare_ultralight_c:-:*:*:*:*:*:*:* cpe:2.3:o:nxp:mifare_ultralight_c_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:nxp:ntag_213:-:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : 1.9
v3 : 4.2 |
CWE | CWE-863 | |
References | (MISC) https://www.nxp.com/docs/en/application-note/AN13089.pdf - Vendor Advisory | |
References | (MISC) https://blog.quarkslab.com/rfid-monotonic-counter-anti-tearing-defeated.html - Mitigation, Third Party Advisory | |
References | (MISC) https://www.nxp.com/docs/en/application-note/AN11340.pdf - Vendor Advisory | |
References | (MISC) https://www.sstic.org/2021/presentation/eeprom_it_will_all_end_in_tears/ - Exploit, Third Party Advisory |
06 Jun 2021, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-06-06 16:15
Updated : 2024-11-21 06:09
NVD link : CVE-2021-33881
Mitre link : CVE-2021-33881
CVE.ORG link : CVE-2021-33881
JSON object : View
Products Affected
nxp
- ntag_210_firmware
- mifare_ultralight_ev1_firmware
- ntag_215_firmware
- ntag_216
- mifare_ultralight_c_firmware
- ntag_213
- ntag_215
- ntag_210
- ntag_212_firmware
- mifare_ultralight_c
- ntag_212
- ntag_216_firmware
- ntag_213_firmware
- mifare_ultralight_ev1
- mifare_ultralight_nano_firmware
- mifare_ultralight_nano
CWE
CWE-863
Incorrect Authorization