diff --git a/2021/37xxx/CVE-2021-37604.json b/2021/37xxx/CVE-2021-37604.json index 3426ed47a8e..f767d243975 100644 --- a/2021/37xxx/CVE-2021-37604.json +++ b/2021/37xxx/CVE-2021-37604.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "In version 6.5 of our MiWi software and all previous versions including legacy products, there is a possibility of frame counters being validated/updated prior to the message authentication. With this vulnerability in place, an attacker may increment the incoming frame counter values by injecting messages with a sufficiently large frame counter value and invalid payload. This results in denial of service/valid packets in the network. There is also a possibility of a replay attack in the stack." + "value": "In version 6.5 of Microchip MiWi software and all previous versions including legacy products, there is a possibility of frame counters being validated/updated prior to the message authentication. With this vulnerability in place, an attacker may increment the incoming frame counter values by injecting messages with a sufficiently large frame counter value and invalid payload. This results in denial of service/valid packets in the network. There is also a possibility of a replay attack in the stack." } ] }, diff --git a/2021/37xxx/CVE-2021-37605.json b/2021/37xxx/CVE-2021-37605.json index f7f858a6f0d..39cba1977ff 100644 --- a/2021/37xxx/CVE-2021-37605.json +++ b/2021/37xxx/CVE-2021-37605.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "In version 6.5 of MiWi software and all previous versions including legacy products, the stack is validating only two out of four Message Integrity Check (MIC) bytes." + "value": "In version 6.5 Microchip MiWi software and all previous versions including legacy products, the stack is validating only two out of four Message Integrity Check (MIC) bytes." } ] },