Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

Car Alarm System KE700

Source -

CNA

CNA CVEs -

3

ADP CVEs -

0

CISA CVEs -

0

NVD CVEs -

0
Related CVEsRelated VendorsRelated AssignersReports
3Vulnerabilities found

CVE-2026-2541
Assigner-Automotive Security Research Group (ASRG)
ShareView Details
Assigner-Automotive Security Research Group (ASRG)
CVSS Score-6.4||MEDIUM
EPSS-Not Assigned
Published-15 Feb, 2026 | 11:07
Updated-15 Feb, 2026 | 11:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Micca KE700 Brute-force vulnerability due to low entropy

The Micca KE700 system relies on a 6-bit portion of an identifier for authentication within rolling codes, providing only 64 possible combinations. This low entropy allows an attacker to perform a brute-force attack against one component of the rolling code. Successful exploitation simplify an attacker to predict the next valid rolling code, granting unauthorized access to the vehicle.

Action-Not Available
Vendor-Micca Auto Electronics Co., Ltd.
Product-Car Alarm System KE700
CWE ID-CWE-331
Insufficient Entropy
CVE-2026-2540
Assigner-Automotive Security Research Group (ASRG)
ShareView Details
Assigner-Automotive Security Research Group (ASRG)
CVSS Score-8.4||HIGH
EPSS-Not Assigned
Published-15 Feb, 2026 | 11:03
Updated-15 Feb, 2026 | 11:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Micca KE700 Acceptance of previously used rolling codes

The Micca KE700 system contains flawed resynchronization logic and is vulnerable to replay attacks. This attack requires sending two previously captured codes in a specific sequence. As a result, the system can be forced to accept previously used (stale) rolling codes and execute a command. Successful exploitation allows an attacker to clone the alarm key. This grants the attacker unauthorized access to the vehicle to unlock or lock the doors.

Action-Not Available
Vendor-Micca Auto Electronics Co., Ltd.
Product-Car Alarm System KE700
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CWE ID-CWE-294
Authentication Bypass by Capture-replay
CVE-2026-2539
Assigner-Automotive Security Research Group (ASRG)
ShareView Details
Assigner-Automotive Security Research Group (ASRG)
CVSS Score-5.7||MEDIUM
EPSS-Not Assigned
Published-15 Feb, 2026 | 10:58
Updated-15 Feb, 2026 | 11:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Micca KE700 Cleartext transmission of key fob ID

The RF communication protocol in the Micca KE700 car alarm system does not encrypt its data frames. An attacker with a radio interception tool (e.g., SDR) can capture the random number and countersĀ transmitted in cleartext, which is sensitive information required for authentication.

Action-Not Available
Vendor-Micca Auto Electronics Co., Ltd.
Product-Car Alarm System KE700
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information