CVE-2021-37604

In version 6.5 of Microchip MiWi software and all previous versions including legacy products, there is a possibility of frame counters being validated/updated prior to the message authentication. With this vulnerability in place, an attacker may increment the incoming frame counter values by injecting messages with a sufficiently large frame counter value and invalid payload. This results in denial of service/valid packets in the network. There is also a possibility of a replay attack in the stack.
Configurations

Configuration 1 (hide)

cpe:2.3:a:microchip:miwi:6.5:*:*:*:*:*:*:*

History

12 Jul 2022, 17:42

Type Values Removed Values Added
CWE CWE-863 CWE-670

01 Jan 2022, 17:56

Type Values Removed Values Added
References (CONFIRM) https://www.microchip.com/en-us/products/wireless-connectivity/software-vulnerability-response/miwi-software-vulnerability - (CONFIRM) https://www.microchip.com/en-us/products/wireless-connectivity/software-vulnerability-response/miwi-software-vulnerability - Vendor Advisory

21 Dec 2021, 22:15

Type Values Removed Values Added
Summary In version 6.5 of our MiWi software and all previous versions including legacy products, there is a possibility of frame counters being validated/updated prior to the message authentication. With this vulnerability in place, an attacker may increment the incoming frame counter values by injecting messages with a sufficiently large frame counter value and invalid payload. This results in denial of service/valid packets in the network. There is also a possibility of a replay attack in the stack. In version 6.5 of Microchip MiWi software and all previous versions including legacy products, there is a possibility of frame counters being validated/updated prior to the message authentication. With this vulnerability in place, an attacker may increment the incoming frame counter values by injecting messages with a sufficiently large frame counter value and invalid payload. This results in denial of service/valid packets in the network. There is also a possibility of a replay attack in the stack.

16 Dec 2021, 14:15

Type Values Removed Values Added
References
  • (CONFIRM) https://www.microchip.com/en-us/products/wireless-connectivity/software-vulnerability-response/miwi-software-vulnerability -
Summary In the Microchip MiWi v6.5 software stack, there is a possibility of frame counters being validated/updated prior to message authentication. In version 6.5 of our MiWi software and all previous versions including legacy products, there is a possibility of frame counters being validated/updated prior to the message authentication. With this vulnerability in place, an attacker may increment the incoming frame counter values by injecting messages with a sufficiently large frame counter value and invalid payload. This results in denial of service/valid packets in the network. There is also a possibility of a replay attack in the stack.

12 Aug 2021, 15:41

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5
CWE CWE-863
CPE cpe:2.3:a:microchip:miwi:6.5:*:*:*:*:*:*:*
References (MISC) https://www.microchip.com/product-change-notifications/#/ - (MISC) https://www.microchip.com/product-change-notifications/#/ - Vendor Advisory
References (MISC) https://ww1.microchip.com/downloads/en/DeviceDoc/asf-release-notes-3.50.0.100-readme.pdf - (MISC) https://ww1.microchip.com/downloads/en/DeviceDoc/asf-release-notes-3.50.0.100-readme.pdf - Release Notes, Vendor Advisory
References (MISC) https://www.microchip.com/en-us/products/wireless-connectivity/sub-ghz/miwi-protocol - (MISC) https://www.microchip.com/en-us/products/wireless-connectivity/sub-ghz/miwi-protocol - Vendor Advisory
References (MISC) https://www.microchip.com/en-us/development-tools-tools-and-software/libraries-code-examples-and-more/advanced-software-framework-for-sam-devices#Downloads - (MISC) https://www.microchip.com/en-us/development-tools-tools-and-software/libraries-code-examples-and-more/advanced-software-framework-for-sam-devices#Downloads - Vendor Advisory

05 Aug 2021, 16:17

Type Values Removed Values Added
New CVE

Information

Published : 2021-08-05 16:15

Updated : 2023-12-10 13:55


NVD link : CVE-2021-37604

Mitre link : CVE-2021-37604

CVE.ORG link : CVE-2021-37604


JSON object : View

Products Affected

microchip

  • miwi
CWE
CWE-670

Always-Incorrect Control Flow Implementation