The Micca KE700 system relies on a 6-bit portion of an...
Moderate severity
Unreviewed
Published
Feb 15, 2026
to the GitHub Advisory Database
•
Updated Feb 15, 2026
Description
Published by the National Vulnerability Database
Feb 15, 2026
Published to the GitHub Advisory Database
Feb 15, 2026
Last updated
Feb 15, 2026
The Micca KE700 system relies on a 6-bit portion of an identifier for authentication within rolling codes, providing only 64 possible combinations. This low entropy allows an attacker to perform a brute-force attack against one component of the rolling code. Successful exploitation simplify an attacker to predict the next valid rolling code, granting unauthorized access to the vehicle.
References