The Micca KE700 system relies on a 6-bit portion of an identifier for authentication within rolling codes, providing only 64 possible combinations. This low entropy allows an attacker to perform a brute-force attack against one component of the rolling code. Successful exploitation simplify an attacker to predict the next valid rolling code, granting unauthorized access to the vehicle.
Metrics
Affected Vendors & Products
References
History
Mon, 16 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Micca Auto Electronics
Micca Auto Electronics car Alarm System Ke700 |
|
| Vendors & Products |
Micca Auto Electronics
Micca Auto Electronics car Alarm System Ke700 |
Sun, 15 Feb 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Micca KE700 system relies on a 6-bit portion of an identifier for authentication within rolling codes, providing only 64 possible combinations. This low entropy allows an attacker to perform a brute-force attack against one component of the rolling code. Successful exploitation simplify an attacker to predict the next valid rolling code, granting unauthorized access to the vehicle. | |
| Title | Micca KE700 Brute-force vulnerability due to low entropy | |
| Weaknesses | CWE-331 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: ASRG
Published:
Updated: 2026-02-15T11:07:40.539Z
Reserved: 2026-02-15T10:49:23.973Z
Link: CVE-2026-2541
No data.
Status : Received
Published: 2026-02-15T11:15:55.223
Modified: 2026-02-15T11:15:55.223
Link: CVE-2026-2541
No data.