In version 6.5 of Microchip MiWi software and all previous versions including legacy products, there is a possibility of frame counters being validated/updated prior to the message authentication. With this vulnerability in place, an attacker may increment the incoming frame counter values by injecting messages with a sufficiently large frame counter value and invalid payload. This results in denial of service/valid packets in the network. There is also a possibility of a replay attack in the stack.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-24162 In version 6.5 of Microchip MiWi software and all previous versions including legacy products, there is a possibility of frame counters being validated/updated prior to the message authentication. With this vulnerability in place, an attacker may increment the incoming frame counter values by injecting messages with a sufficiently large frame counter value and invalid payload. This results in denial of service/valid packets in the network. There is also a possibility of a replay attack in the stack.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T01:23:01.238Z

Reserved: 2021-07-28T00:00:00

Link: CVE-2021-37604

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-08-05T16:15:07.217

Modified: 2024-11-21T06:15:30.483

Link: CVE-2021-37604

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses