The following issues affect version 6.5 of MiWi software.
In version 6.5 of our MiWi software and all previous versions including legacy products, there is a possibility of frame counters being validated/updated prior to the message authentication. With this vulnerability in place, an attacker may increment the incoming frame counter values by injecting messages with a sufficiently large frame counter value and invalid payload. This results in denial of service/valid packets in the network. There is also a possibility of a replay attack in the stack.
In the code snippet below, the frame counters were validated/considered before the payload authentication.
In version 6.5 of our MiWi software and all previous versions including legacy products, the stack is validating only two out of four Message Integrity Check (MIC) bytes.
In the code snippet below, only two out of four MIC bytes were used.
Special thanks to Szymon Heidrich of Carrier Global Corporation for reporting this vulnerability.