Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-ff8p-pfwc-wjf2

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

On NXP MIFARE Ultralight and NTAG cards, an attacker can interrupt a write operation (aka conduct a "tear off" attack) over RFID to bypass a Monotonic Counter protection mechanism. The impact depends on how the anti tear-off feature is used in specific applications such as public transportation, physical access control, etc.

On NXP MIFARE Ultralight and NTAG cards, an attacker can interrupt a write operation (aka conduct a "tear off" attack) over RFID to bypass a Monotonic Counter protection mechanism. The impact depends on how the anti tear-off feature is used in specific applications such as public transportation, physical access control, etc.

EPSS

Процентиль: 19%
0.0006
Низкий

Дефекты

CWE-863

Связанные уязвимости

CVSS3: 4.2
nvd
больше 4 лет назад

On NXP MIFARE Ultralight and NTAG cards, an attacker can interrupt a write operation (aka conduct a "tear off" attack) over RFID to bypass a Monotonic Counter protection mechanism. The impact depends on how the anti tear-off feature is used in specific applications such as public transportation, physical access control, etc.

EPSS

Процентиль: 19%
0.0006
Низкий

Дефекты

CWE-863