Impact
The Micca KE700 alarm system suffers from flawed resynchronization logic that permits replay attacks, an authentication failure (CWE‑288) caused by insufficient anti‑replay protection and a missing replay detection (CWE‑294). By transmitting two previously captured rolling codes in a specific order, an attacker can trick the receiver into accepting a stale code, effectively cloning the alarm key. The cloned key then grants unauthorized control to unlock or lock the vehicle, representing a significant escalation of privileges.
Affected Systems
Vendor Micca Auto Electronics Co., Ltd. produces the Car Alarm System KE700 that is affected. No specific product versions are listed, so all implementations of this model should be considered vulnerable.
Risk and Exploitability
The CVSS score of 8.4 indicates a high severity vulnerability. EPSS < 1% suggests a low probability of exploitation so far, and the vulnerability is not listed in the CISA KEV catalog, implying no widespread public exploitation reports. Based on the description, it is inferred that the attacker must capture two valid rolling codes—likely through physical proximity or signal interception—before carrying out the replay sequence. Once the replay succeeds, the system grants access that was never intended for the attacker.
OpenCVE Enrichment