4.2
CVE-2021-33881
- EPSS 0.06%
- Veröffentlicht 06.06.2021 16:15:07
- Zuletzt bearbeitet 21.11.2024 06:09:42
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
On NXP MIFARE Ultralight and NTAG cards, an attacker can interrupt a write operation (aka conduct a "tear off" attack) over RFID to bypass a Monotonic Counter protection mechanism. The impact depends on how the anti tear-off feature is used in specific applications such as public transportation, physical access control, etc.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Nxp ≫ Mifare Ultralight Ev1 Firmware Version-
Nxp ≫ Mifare Ultralight C Firmware Version-
Nxp ≫ Mifare Ultralight Nano Firmware Version-
Nxp ≫ Ntag 210 Firmware Version-
Nxp ≫ Ntag 212 Firmware Version-
Nxp ≫ Ntag 213 Firmware Version-
Nxp ≫ Ntag 215 Firmware Version-
Nxp ≫ Ntag 216 Firmware Version-
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.06% | 0.187 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 4.2 | 0.5 | 3.6 |
CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
|
| nvd@nist.gov | 1.9 | 3.4 | 2.9 |
AV:L/AC:M/Au:N/C:N/I:P/A:N
|
CWE-863 Incorrect Authorization
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.