{"id":"CVE-2021-37605","details":"In version 6.5 Microchip MiWi software and all previous versions including legacy products, the stack is validating only two out of four Message Integrity Check (MIC) bytes.","modified":"2026-03-15T22:41:16.812004Z","published":"2021-08-05T16:15:07.257Z","references":[{"type":"ADVISORY","url":"https://www.microchip.com/en-us/products/wireless-connectivity/sub-ghz/miwi-protocol"},{"type":"ADVISORY","url":"https://www.microchip.com/product-change-notifications/#/"},{"type":"ADVISORY","url":"https://ww1.microchip.com/downloads/en/DeviceDoc/asf-release-notes-3.50.0.100-readme.pdf"},{"type":"ADVISORY","url":"https://ww1.microchip.com/downloads/en/DeviceDoc/asf-release-notes-3.51.0.101-readme.pdf"},{"type":"ADVISORY","url":"https://www.microchip.com/en-us/development-tools-tools-and-software/libraries-code-examples-and-more/advanced-software-framework-for-sam-devices#Downloads"},{"type":"ADVISORY","url":"https://www.microchip.com/en-us/products/wireless-connectivity/software-vulnerability-response/miwi-software-vulnerability"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-37605.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"6.5"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}]}