CVE-2026-2539
Unencrypted RF Protocol in Micca KE700 Enables Authentication Bypass
Publication date: 2026-02-15
Last updated on: 2026-02-15
Assigner: Automotive Security Research Group (ASRG)
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| micca | auto_electronics_ke700 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-319 | The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': 'The vulnerability in the Micca KE700 car alarm system arises because its RF communication protocol transmits sensitive data frames, including a 16-bit counter and a 9-bit Key Fob ID, entirely in cleartext without encryption.'}, {'type': 'paragraph', 'content': 'An attacker with a radio interception tool, such as a software-defined radio, can passively capture this sensitive information. The system uses a proprietary rolling code implementation that is insecure, allowing attackers to decode the transmitted bits and obtain the current counter and Key Fob ID.'}, {'type': 'paragraph', 'content': 'This exposure enables brute-force attacks to predict future valid codes and also allows replay attacks due to a flawed resynchronization logic called the "RollBack" flaw, where previously captured signals can be reused to unlock the vehicle.'}, {'type': 'paragraph', 'content': 'Overall, the vulnerability compromises the confidentiality and integrity of the authentication process, enabling unauthorized access through passive interception and replay attacks.'}] [1]
How can this vulnerability impact me? :
[{'type': 'paragraph', 'content': 'This vulnerability can lead to unauthorized access to your vehicle because attackers can intercept and decode the unencrypted signals used for authentication.'}, {'type': 'paragraph', 'content': 'Attackers can perform brute-force attacks to predict future valid codes or replay previously captured signals to unlock the car alarm system, bypassing security controls.'}, {'type': 'paragraph', 'content': "As a result, your vehicle's security is compromised, increasing the risk of theft or unauthorized use."}] [1]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by passively intercepting the RF communication frames transmitted by the Micca KE700 car alarm system. Tools such as software-defined radios (SDRs) like HackRF or BladeRF can be used to capture the 41-bit rolling code frames, which include a 16-bit counter and a 9-bit Key Fob ID transmitted in cleartext.
Detection involves capturing and decoding the RF signals to verify if sensitive data such as counters and Key Fob IDs are transmitted without encryption. The bits are represented as specific pulse patterns (1 as 1110, 0 as 1000), which can be decoded using logic analyzers or SDR software.
Suggested commands depend on the SDR tool used. For example, with GNU Radio or similar SDR software, you can capture the RF signals on the relevant frequency band and analyze the pulse patterns. Using tools like rtl_sdr or hackrf_transfer, you can record the raw RF data for offline analysis.
- Use an SDR device (e.g., HackRF) to capture RF signals: `hackrf_transfer -r capture.bin -f <frequency>`
- Analyze the captured data with a decoding script or logic analyzer to identify the cleartext rolling code frames.
- Look for repeated transmissions containing the 16-bit counter and 9-bit Key Fob ID in cleartext.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include preventing attackers from successfully intercepting and replaying the RF signals. Since the system does not encrypt its transmissions, physical security measures should be enhanced to reduce exposure.
Recommendations include implementing encryption of the entire transmission frame using a standard symmetric algorithm such as AES-128, and incorporating a Message Authentication Code (MAC) to authenticate the frame and prevent tampering or spoofing.
Until a firmware or hardware update is available from the manufacturer, users should consider disabling remote key fob functionality if possible, or supplementing the system with additional security controls such as steering wheel locks or immobilizers.
Monitoring for suspicious activity and avoiding leaving the vehicle in unsecured areas can also reduce risk.