The Micca KE700 system contains flawed resynchronization logic and is vulnerable to replay attacks. This attack requires sending two previously captured codes in a specific sequence. As a result, the system can be forced to accept previously used (stale) rolling codes and execute a command. Successful exploitation allows an attacker to clone the alarm key. This grants the attacker unauthorized access to the vehicle to unlock or lock the doors.
CVSS
No CVSS.
References
| Link | Resource |
|---|---|
| https://asrg.io/security-advisories/cve-2026-2540/ |
Configurations
No configuration.
History
18 Feb 2026, 17:52
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
15 Feb 2026, 11:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-15 11:15
Updated : 2026-02-18 17:52
NVD link : CVE-2026-2540
Mitre link : CVE-2026-2540
CVE.ORG link : CVE-2026-2540
JSON object : View
Products Affected
No product.
