Impact
A 6‑bit portion of the Micca KE700 alarm system’s rolling code is used for authentication. Because only 64 combinations are available, an attacker can brute‑force this component quickly and predict the next valid code. This allows an unauthorized user to gain entry to the vehicle, effectively bypassing the intended security mechanism. The weakness exemplifies insufficient entropy, classified as CWE‑331.
Affected Systems
All Micca Auto Electronics’ Car Alarm System KE700 units are affected. The vulnerability applies to every deployment of the KE700 product; no specific firmware or hardware revision information was provided.
Risk and Exploitability
The CVSS base score is 6.4, indicating a moderate impact. The EPSS score is below 1 %, suggesting that exploitation is unlikely under normal circumstances, but the simplicity of the attack (requiring only a brute‑force on a 6‑bit field) means a determined adversary can repeat the process rapidly. The vulnerability is not yet listed in the CISA Known Exploited Vulnerabilities catalog. The attack path is inferred to involve access to the vehicle’s signaling interface or a similar channel where the rolling code is transmitted, allowing an attacker to capture or guess the 6‑bit code easily.
OpenCVE Enrichment