Описание
On NXP MIFARE Ultralight and NTAG cards, an attacker can interrupt a write operation (aka conduct a "tear off" attack) over RFID to bypass a Monotonic Counter protection mechanism. The impact depends on how the anti tear-off feature is used in specific applications such as public transportation, physical access control, etc.
Ссылки
- MitigationThird Party Advisory
- Vendor Advisory
- Vendor Advisory
- ExploitThird Party Advisory
- MitigationThird Party Advisory
- Vendor Advisory
- Vendor Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Одновременно
Одновременно
Одновременно
Одновременно
Одновременно
Одновременно
Одновременно
Одновременно
EPSS
4.2 Medium
CVSS3
1.9 Low
CVSS2
Дефекты
Связанные уязвимости
On NXP MIFARE Ultralight and NTAG cards, an attacker can interrupt a write operation (aka conduct a "tear off" attack) over RFID to bypass a Monotonic Counter protection mechanism. The impact depends on how the anti tear-off feature is used in specific applications such as public transportation, physical access control, etc.
EPSS
4.2 Medium
CVSS3
1.9 Low
CVSS2