CVE-2021-33881

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
06/06/2021
Last modified:
17/06/2021

Description

On NXP MIFARE Ultralight and NTAG cards, an attacker can interrupt a write operation (aka conduct a "tear off" attack) over RFID to bypass a Monotonic Counter protection mechanism. The impact depends on how the anti tear-off feature is used in specific applications such as public transportation, physical access control, etc.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:nxp:mifare_ultralight_ev1_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:mifare_ultralight_ev1:-:*:*:*:*:*:*:*
cpe:2.3:o:nxp:mifare_ultralight_c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:mifare_ultralight_c:-:*:*:*:*:*:*:*
cpe:2.3:o:nxp:mifare_ultralight_nano_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:mifare_ultralight_nano:-:*:*:*:*:*:*:*
cpe:2.3:o:nxp:ntag_210_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:ntag_210:-:*:*:*:*:*:*:*
cpe:2.3:o:nxp:ntag_212_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:ntag_212:-:*:*:*:*:*:*:*
cpe:2.3:o:nxp:ntag_213_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:ntag_213:-:*:*:*:*:*:*:*
cpe:2.3:o:nxp:ntag_215_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:ntag_215:-:*:*:*:*:*:*:*
cpe:2.3:o:nxp:ntag_216_firmware:-:*:*:*:*:*:*:*