CVE-2021-33881

On NXP MIFARE Ultralight and NTAG cards, an attacker can interrupt a write operation (aka conduct a "tear off" attack) over RFID to bypass a Monotonic Counter protection mechanism. The impact depends on how the anti tear-off feature is used in specific applications such as public transportation, physical access control, etc.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:nxp:mifare_ultralight_ev1_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:mifare_ultralight_ev1:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:nxp:mifare_ultralight_c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:mifare_ultralight_c:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:nxp:mifare_ultralight_nano_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:mifare_ultralight_nano:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:nxp:ntag_210_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:ntag_210:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:nxp:ntag_212_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:ntag_212:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:nxp:ntag_213_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:ntag_213:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:nxp:ntag_215_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:ntag_215:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:nxp:ntag_216_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:ntag_216:-:*:*:*:*:*:*:*

History

17 Jun 2021, 16:39

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 1.9
v3 : 4.2
CWE CWE-863
References (MISC) https://www.nxp.com/docs/en/application-note/AN11340.pdf - (MISC) https://www.nxp.com/docs/en/application-note/AN11340.pdf - Vendor Advisory
References (MISC) https://blog.quarkslab.com/rfid-monotonic-counter-anti-tearing-defeated.html - (MISC) https://blog.quarkslab.com/rfid-monotonic-counter-anti-tearing-defeated.html - Mitigation, Third Party Advisory
References (MISC) https://www.nxp.com/docs/en/application-note/AN13089.pdf - (MISC) https://www.nxp.com/docs/en/application-note/AN13089.pdf - Vendor Advisory
References (MISC) https://www.sstic.org/2021/presentation/eeprom_it_will_all_end_in_tears/ - (MISC) https://www.sstic.org/2021/presentation/eeprom_it_will_all_end_in_tears/ - Exploit, Third Party Advisory
CPE cpe:2.3:o:nxp:ntag_212_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:nxp:mifare_ultralight_ev1_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:mifare_ultralight_ev1:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:mifare_ultralight_c:-:*:*:*:*:*:*:*
cpe:2.3:o:nxp:mifare_ultralight_c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:mifare_ultralight_nano:-:*:*:*:*:*:*:*
cpe:2.3:o:nxp:ntag_215_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:nxp:ntag_216_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:nxp:ntag_213_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:ntag_213:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:ntag_216:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:ntag_210:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:ntag_215:-:*:*:*:*:*:*:*
cpe:2.3:o:nxp:mifare_ultralight_nano_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:nxp:ntag_210_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:ntag_212:-:*:*:*:*:*:*:*

06 Jun 2021, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-06-06 16:15

Updated : 2023-12-10 13:55


NVD link : CVE-2021-33881

Mitre link : CVE-2021-33881

CVE.ORG link : CVE-2021-33881


JSON object : View

Products Affected

nxp

  • mifare_ultralight_c_firmware
  • mifare_ultralight_nano
  • ntag_210
  • mifare_ultralight_ev1_firmware
  • ntag_212
  • ntag_216_firmware
  • ntag_215
  • ntag_216
  • ntag_210_firmware
  • ntag_213_firmware
  • mifare_ultralight_nano_firmware
  • mifare_ultralight_ev1
  • ntag_215_firmware
  • ntag_213
  • ntag_212_firmware
  • mifare_ultralight_c
CWE
CWE-863

Incorrect Authorization