On NXP MIFARE Ultralight and NTAG cards, an attacker can interrupt a write operation (aka conduct a "tear off" attack) over RFID to bypass a Monotonic Counter protection mechanism. The impact depends on how the anti tear-off feature is used in specific applications such as public transportation, physical access control, etc.
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Link | Tags |
---|---|
https://blog.quarkslab.com/rfid-monotonic-counter-anti-tearing-defeated.html | third party advisory mitigation |
https://www.nxp.com/docs/en/application-note/AN13089.pdf | vendor advisory |
https://www.nxp.com/docs/en/application-note/AN11340.pdf | vendor advisory |
https://www.sstic.org/2021/presentation/eeprom_it_will_all_end_in_tears/ | third party advisory exploit |