flipperzero-firmware icon indicating copy to clipboard operation
flipperzero-firmware copied to clipboard

MIFARE Ultralight C hex dump shows bogus data for locked pages

Open supersat opened this issue 7 months ago • 1 comments

Describe the bug.

At a recent event, we gave everyone MIFARE Ultralight C wristbands with some pages locked as part of a CTF. Many people tried reading their wristband with their Flipper Zero, and unfortunately, rather than seeing some pages locked in the hex dump, they saw bogus data (seemingly copied starting from page 0). The NXP TagInfo app for Android correctly showed those pages as XX XX XX XX.

Reproduction

  1. Auth-protect some pages on a MIFARE Ultralight C card. This can be done by writing 25 00 00 00 to page 0x2a and 00 00 00 00 to page 0x2b. This locks pages 0x25 and up from being read without authentication.
  2. Read the tag with the Flipper Zero.
  3. Select Info, then more, then scroll down to the bottom. The last 3 pages should show as locked, but are copies of pages 0, 1, and 2.

Target

No response

Logs

No response

Anything else?

FW version 0.103.1

supersat avatar Jul 09 '24 00:07 supersat