CVE-2021-37605

In version 6.5 Microchip MiWi software and all previous versions including legacy products, the stack is validating only two out of four Message Integrity Check (MIC) bytes.
Configurations

Configuration 1 (hide)

cpe:2.3:a:microchip:miwi:6.5:*:*:*:*:*:*:*

History

12 Jul 2022, 17:42

Type Values Removed Values Added
CWE CWE-863 CWE-670

01 Jan 2022, 17:57

Type Values Removed Values Added
References (MISC) https://ww1.microchip.com/downloads/en/DeviceDoc/asf-release-notes-3.51.0.101-readme.pdf - (MISC) https://ww1.microchip.com/downloads/en/DeviceDoc/asf-release-notes-3.51.0.101-readme.pdf - Release Notes, Vendor Advisory
References (MISC) https://www.microchip.com/en-us/products/wireless-connectivity/software-vulnerability-response/miwi-software-vulnerability - (MISC) https://www.microchip.com/en-us/products/wireless-connectivity/software-vulnerability-response/miwi-software-vulnerability - Vendor Advisory

21 Dec 2021, 22:15

Type Values Removed Values Added
Summary In version 6.5 of MiWi software and all previous versions including legacy products, the stack is validating only two out of four Message Integrity Check (MIC) bytes. In version 6.5 Microchip MiWi software and all previous versions including legacy products, the stack is validating only two out of four Message Integrity Check (MIC) bytes.

16 Dec 2021, 14:15

Type Values Removed Values Added
Summary In the Microchip MiWi v6.5 software stack, there is a possibility of frame counters being being validated / updated prior to message authentication. In version 6.5 of MiWi software and all previous versions including legacy products, the stack is validating only two out of four Message Integrity Check (MIC) bytes.
References
  • (MISC) https://www.microchip.com/en-us/products/wireless-connectivity/software-vulnerability-response/miwi-software-vulnerability -

29 Sep 2021, 20:15

Type Values Removed Values Added
References
  • (MISC) https://ww1.microchip.com/downloads/en/DeviceDoc/asf-release-notes-3.51.0.101-readme.pdf -

12 Aug 2021, 15:40

Type Values Removed Values Added
References (MISC) https://www.microchip.com/product-change-notifications/#/ - (MISC) https://www.microchip.com/product-change-notifications/#/ - Vendor Advisory
References (MISC) https://ww1.microchip.com/downloads/en/DeviceDoc/asf-release-notes-3.50.0.100-readme.pdf - (MISC) https://ww1.microchip.com/downloads/en/DeviceDoc/asf-release-notes-3.50.0.100-readme.pdf - Vendor Advisory
References (MISC) https://www.microchip.com/en-us/products/wireless-connectivity/sub-ghz/miwi-protocol - (MISC) https://www.microchip.com/en-us/products/wireless-connectivity/sub-ghz/miwi-protocol - Vendor Advisory
References (MISC) https://www.microchip.com/en-us/development-tools-tools-and-software/libraries-code-examples-and-more/advanced-software-framework-for-sam-devices#Downloads - (MISC) https://www.microchip.com/en-us/development-tools-tools-and-software/libraries-code-examples-and-more/advanced-software-framework-for-sam-devices#Downloads - Vendor Advisory
CWE CWE-863
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5
CPE cpe:2.3:a:microchip:miwi:6.5:*:*:*:*:*:*:*

05 Aug 2021, 16:17

Type Values Removed Values Added
New CVE

Information

Published : 2021-08-05 16:15

Updated : 2023-12-10 13:55


NVD link : CVE-2021-37605

Mitre link : CVE-2021-37605

CVE.ORG link : CVE-2021-37605


JSON object : View

Products Affected

microchip

  • miwi
CWE
CWE-670

Always-Incorrect Control Flow Implementation