4.2

CVE-2021-33881

Exploit
On NXP MIFARE Ultralight and NTAG cards, an attacker can interrupt a write operation (aka conduct a "tear off" attack) over RFID to bypass a Monotonic Counter protection mechanism. The impact depends on how the anti tear-off feature is used in specific applications such as public transportation, physical access control, etc.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
NxpMifare Ultralight C Firmware Version-
   NxpMifare Ultralight C Version-
NxpNtag 210 Firmware Version-
   NxpNtag 210 Version-
NxpNtag 212 Firmware Version-
   NxpNtag 212 Version-
NxpNtag 213 Firmware Version-
   NxpNtag 213 Version-
NxpNtag 215 Firmware Version-
   NxpNtag 215 Version-
NxpNtag 216 Firmware Version-
   NxpNtag 216 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.06% 0.187
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 4.2 0.5 3.6
CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
nvd@nist.gov 1.9 3.4 2.9
AV:L/AC:M/Au:N/C:N/I:P/A:N
CWE-863 Incorrect Authorization

The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.