Metrics
Affected Vendors & Products
No advisories yet.
Solution
* Increase entropy: The random component of the code must be significantly larger. A 16-bit keyspace is insecure by modern standards. A minimum of 64 bits of entropy would make a brute-force attack computationally infeasible.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://asrg.io/security-advisories/cve-2026-2541/ |
|
Tue, 17 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 16 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Micca Auto Electronics
Micca Auto Electronics car Alarm System Ke700 |
|
| Vendors & Products |
Micca Auto Electronics
Micca Auto Electronics car Alarm System Ke700 |
Sun, 15 Feb 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Micca KE700 system relies on a 6-bit portion of an identifier for authentication within rolling codes, providing only 64 possible combinations. This low entropy allows an attacker to perform a brute-force attack against one component of the rolling code. Successful exploitation simplify an attacker to predict the next valid rolling code, granting unauthorized access to the vehicle. | |
| Title | Micca KE700 Brute-force vulnerability due to low entropy | |
| Weaknesses | CWE-331 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: ASRG
Published:
Updated: 2026-02-17T17:06:46.968Z
Reserved: 2026-02-15T10:49:23.973Z
Link: CVE-2026-2541
Updated: 2026-02-17T16:42:17.228Z
Status : Received
Published: 2026-02-15T11:15:55.223
Modified: 2026-02-15T11:15:55.223
Link: CVE-2026-2541
No data.
OpenCVE Enrichment
Updated: 2026-02-16T09:43:05Z