CVE-2021-33881
06.06.2021, 16:15
On NXP MIFARE Ultralight and NTAG cards, an attacker can interrupt a write operation (aka conduct a "tear off" attack) over RFID to bypass a Monotonic Counter protection mechanism. The impact depends on how the anti tear-off feature is used in specific applications such as public transportation, physical access control, etc.Enginsight
Vendor | Product | Version |
---|---|---|
nxp | mifare_ultralight_ev1_firmware | - |
nxp | mifare_ultralight_c_firmware | - |
nxp | mifare_ultralight_nano_firmware | - |
nxp | ntag_210_firmware | - |
nxp | ntag_212_firmware | - |
nxp | ntag_213_firmware | - |
nxp | ntag_215_firmware | - |
nxp | ntag_216_firmware | - |
𝑥
= Vulnerable software versions
References