The RF communication protocol in the Micca KE700 car alarm system does not encrypt its data frames. An attacker with a radio interception tool (e.g., SDR) can capture the random number and counters transmitted in cleartext, which is sensitive information required for authentication.

Project Subscriptions

No data.

Advisories

No advisories yet.

Fixes

Solution

* Implement encryption: The entire transmission frame must be encrypted using a standard, proven symmetric algorithm (e.g., AES-128).  * Authenticate the frame: The encrypted payload should include a Message Authentication Code (MAC) to prevent tampering or spoofing.


Workaround

No workaround given by the vendor.

History

Sun, 15 Feb 2026 11:15:00 +0000

Type Values Removed Values Added
Description The RF communication protocol in the Micca KE700 car alarm system does not encrypt its data frames. An attacker with a radio interception tool (e.g., SDR) can capture the random number and counters transmitted in cleartext, which is sensitive information required for authentication.
Title Micca KE700 Cleartext transmission of key fob ID
Weaknesses CWE-319
References
Metrics cvssV4_0

{'score': 5.7, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N/E:P/AU:N/V:D/RE:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: ASRG

Published:

Updated: 2026-02-15T10:58:38.397Z

Reserved: 2026-02-15T10:49:21.601Z

Link: CVE-2026-2539

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-02-15T11:15:54.897

Modified: 2026-02-15T11:15:54.897

Link: CVE-2026-2539

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses