Project Subscriptions
No data.
No advisories yet.
Solution
* Increase entropy: The random component of the code must be significantly larger. A 16-bit keyspace is insecure by modern standards. A minimum of 64 bits of entropy would make a brute-force attack computationally infeasible.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://asrg.io/security-advisories/cve-2026-2541/ |
|
Sun, 15 Feb 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Micca KE700 system relies on a 6-bit portion of an identifier for authentication within rolling codes, providing only 64 possible combinations. This low entropy allows an attacker to perform a brute-force attack against one component of the rolling code. Successful exploitation simplify an attacker to predict the next valid rolling code, granting unauthorized access to the vehicle. | |
| Title | Micca KE700 Brute-force vulnerability due to low entropy | |
| Weaknesses | CWE-331 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: ASRG
Published:
Updated: 2026-02-15T11:07:40.539Z
Reserved: 2026-02-15T10:49:23.973Z
Link: CVE-2026-2541
No data.
Status : Received
Published: 2026-02-15T11:15:55.223
Modified: 2026-02-15T11:15:55.223
Link: CVE-2026-2541
No data.
OpenCVE Enrichment
No data.