Home

Description

The Micca KE700 system contains flawed resynchronization logic and is vulnerable to replay attacks. This attack requires sending two previously captured codes in a specific sequence. As a result, the system can be forced to accept previously used (stale) rolling codes and execute a command. Successful exploitation allows an attacker to clone the alarm key. This grants the attacker unauthorized access to the vehicle to unlock or lock the doors.

PUBLISHED Reserved 2026-02-15 | Published 2026-02-15 | Updated 2026-02-17 | Assigner ASRG




HIGH: 8.4CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:N/SC:L/SI:L/SA:H/V:D/RE:M

Problem types

CWE-288: Authentication Bypass Using an Alternate Path or Channel

CWE-294: Authentication Bypass by Capture-replay

Product status

Default status
affected

KE700
affected

KE700+
unknown

Credits

Danilo Erazo finder

References

asrg.io/security-advisories/cve-2026-2540/ third-party-advisory

cve.org (CVE-2026-2540)

nvd.nist.gov (CVE-2026-2540)

Download JSON