CVE-2026-2541 PUBLISHED

Micca KE700 Brute-force vulnerability due to low entropy

Assigner: ASRG
Reserved: 15.02.2026 Published: 15.02.2026 Updated: 15.02.2026

The Micca KE700 system relies on a 6-bit portion of an identifier for authentication within rolling codes, providing only 64 possible combinations. This low entropy allows an attacker to perform a brute-force attack against one component of the rolling code. Successful exploitation simplify an attacker to predict the next valid rolling code, granting unauthorized access to the vehicle.

Metrics

CVSS Vector: CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:H/V:D/RE:H
CVSS Score: 6.4

Product Status

Vendor Micca Auto Electronics Co., Ltd.
Product Car Alarm System KE700
Versions Default: affected
  • Version KE700 is affected
  • Version KE700+ is unknown

Solutions

  • Increase entropy: The random component of the code must be significantly larger. A 16-bit keyspace is insecure by modern standards. A minimum of 64 bits of entropy would make a brute-force attack computationally infeasible.

Credits

  • Danilo Erazo finder

References

Problem Types

  • CWE-331: Insufficient Entropy CWE

Impacts

  • CAPEC-112: Brute Force