First published: Sun Jun 06 2021(Updated: )
On NXP MIFARE Ultralight and NTAG cards, an attacker can interrupt a write operation (aka conduct a "tear off" attack) over RFID to bypass a Monotonic Counter protection mechanism. The impact depends on how the anti tear-off feature is used in specific applications such as public transportation, physical access control, etc.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Nxp Mifare Ultralight Ev1 Firmware | ||
Nxp Mifare Ultralight Ev1 | ||
Nxp Mifare Ultralight C Firmware | ||
Nxp Mifare Ultralight C | ||
Nxp Mifare Ultralight Nano Firmware | ||
Nxp Mifare Ultralight Nano | ||
Nxp Ntag 210 Firmware | ||
Nxp Ntag 210 | ||
Nxp Ntag 212 Firmware | ||
Nxp Ntag 212 | ||
Nxp Ntag 213 Firmware | ||
Nxp Ntag 213 | ||
Nxp Ntag 215 Firmware | ||
Nxp Ntag 215 | ||
Nxp Ntag 216 Firmware | ||
Nxp Ntag 216 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-33881 is a vulnerability that allows an attacker to interrupt a write operation on NXP MIFARE Ultralight and NTAG cards, bypassing a Monotonic Counter protection mechanism.
CVE-2021-33881 has a severity rating of 4.2 (medium).
The impact of CVE-2021-33881 on public transportation depends on how the anti tear-off feature is used in specific applications.
Yes, you can refer to the following resources for more information: [An article on RFID Monotonic Counter Anti-Tearing Defeated](https://blog.quarkslab.com/rfid-monotonic-counter-anti-tearing-defeated.html), [NXP Application Note AN11340](https://www.nxp.com/docs/en/application-note/AN11340.pdf), [NXP Application Note AN13089](https://www.nxp.com/docs/en/application-note/AN13089.pdf).
CVE-2021-33881 is associated with CWE-863.