Description
The Micca KE700 system contains flawed resynchronization logic and is vulnerable to replay attacks. This attack requires sending two previously captured codes in a specific sequence. As a result, the system can be forced to accept previously used (stale) rolling codes and execute a command. Successful exploitation allows an attacker to clone the alarm key. This grants the attacker unauthorized access to the vehicle to unlock or lock the doors.
Problem types
CWE-288: Authentication Bypass Using an Alternate Path or Channel
CWE-294: Authentication Bypass by Capture-replay
Product status
KE700
KE700+
Credits
Danilo Erazo
References
asrg.io/security-advisories/cve-2026-2540/