Description
On NXP MIFARE Ultralight and NTAG cards, an attacker can interrupt a write operation (aka conduct a "tear off" attack) over RFID to bypass a Monotonic Counter protection mechanism. The impact depends on how the anti tear-off feature is used in specific applications such as public transportation, physical access control, etc.
Published: 2021-06-06
Score: 4.2 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-20554 On NXP MIFARE Ultralight and NTAG cards, an attacker can interrupt a write operation (aka conduct a "tear off" attack) over RFID to bypass a Monotonic Counter protection mechanism. The impact depends on how the anti tear-off feature is used in specific applications such as public transportation, physical access control, etc.
History

No history.

Subscriptions

Nxp Mifare Ultralight C Mifare Ultralight C Firmware Mifare Ultralight Ev1 Mifare Ultralight Ev1 Firmware Mifare Ultralight Nano Mifare Ultralight Nano Firmware Ntag 210 Ntag 210 Firmware Ntag 212 Ntag 212 Firmware Ntag 213 Ntag 213 Firmware Ntag 215 Ntag 215 Firmware Ntag 216 Ntag 216 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T00:05:51.714Z

Reserved: 2021-06-06T00:00:00.000Z

Link: CVE-2021-33881

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-06-06T16:15:07.407

Modified: 2024-11-21T06:09:42.567

Link: CVE-2021-33881

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses