Impact
The Micca KE700 car alarm system transmits authentication data over RF without encryption, allowing an attacker to capture the random number and counters used for key fob authentication in cleartext. This disclosure enables the attacker to gain knowledge of the authentication material used by the system, compromising the integrity of the access control mechanism and potentially facilitating unauthorized vehicle entry.
Affected Systems
Micca Auto Electronics Co., Ltd. Car Alarm System KE700. No specific affected firmware or firmware revision is listed in the advisory, indicating that the flaw may exist in all builds that use the unencrypted RF protocol.
Risk and Exploitability
The vulnerability has a CVSS score of 5.7, which indicates a medium impact. The EPSS score of less than 1% implies very low but non‑zero likelihood of exploitation. It is not listed in the CISA KEV catalog, suggesting no widespread active exploitation has been reported. The likely attack vector is a remote wireless signal interception using a software defined radio or other RF capture device. An attacker would need only the ability to listen to the KE700 traffic and could obtain the sensitive authentication numbers without any local physical access to the vehicle.
OpenCVE Enrichment