The Micca KE700 system contains flawed resynchronization logic and is vulnerable to replay attacks. This attack requires sending two previously captured codes in a specific sequence. As a result, the system can be forced to accept previously used (stale) rolling codes and execute a command. Successful exploitation allows an attacker to clone the alarm key. This grants the attacker unauthorized access to the vehicle to unlock or lock the doors.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://asrg.io/security-advisories/cve-2026-2540/ |
|
History
Sun, 15 Feb 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Micca KE700 system contains flawed resynchronization logic and is vulnerable to replay attacks. This attack requires sending two previously captured codes in a specific sequence. As a result, the system can be forced to accept previously used (stale) rolling codes and execute a command. Successful exploitation allows an attacker to clone the alarm key. This grants the attacker unauthorized access to the vehicle to unlock or lock the doors. | |
| Title | Micca KE700 Acceptance of previously used rolling codes | |
| Weaknesses | CWE-288 CWE-294 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: ASRG
Published: 2026-02-15T11:03:26.051Z
Updated: 2026-02-15T11:03:26.051Z
Reserved: 2026-02-15T10:49:22.820Z
Link: CVE-2026-2540
No data.
Status : Received
Published: 2026-02-15T11:15:55.070
Modified: 2026-02-15T11:15:55.070
Link: CVE-2026-2540
No data.
ReportizFlow