Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2539: CWE-319: Cleartext Transmission of Sensitive Information in Micca Auto Electronics Co., Ltd. Car Alarm System KE700

0
Medium
VulnerabilityCVE-2026-2539cvecve-2026-2539cwe-319
Published: Sun Feb 15 2026 (02/15/2026, 10:58:38 UTC)
Source: CVE Database V5
Vendor/Project: Micca Auto Electronics Co., Ltd.
Product: Car Alarm System KE700

Description

The RF communication protocol in the Micca KE700 car alarm system does not encrypt its data frames. An attacker with a radio interception tool (e.g., SDR) can capture the random number and counters transmitted in cleartext, which is sensitive information required for authentication.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 00:02:34 UTC

Technical Analysis

CVE-2026-2539 identifies a vulnerability in the Micca Auto Electronics KE700 car alarm system where the RF communication protocol transmits sensitive authentication data, including random numbers and counters, in cleartext. This lack of encryption violates secure communication principles and corresponds to CWE-319 (Cleartext Transmission of Sensitive Information). An attacker equipped with a radio interception tool like an SDR can passively capture these data frames within the RF range. Since these values are critical for authenticating commands to the alarm system, their exposure enables potential replay attacks or cloning of valid authentication sequences. The vulnerability does not require user interaction, privileges, or network access beyond proximity to the vehicle's RF signals. The CVSS 4.0 vector (AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N/E:P/AU:N/V:D/RE:H) reflects medium severity, highlighting that while exploitation is feasible with low complexity, the attack scope is limited to local RF interception. No patches or firmware updates have been published yet, and no exploits are known in the wild. The vulnerability impacts the confidentiality and integrity of the authentication process but does not directly affect availability. This flaw undermines the security guarantees of the KE700 system, potentially allowing unauthorized disarming or control of the vehicle alarm.

Potential Impact

The primary impact of this vulnerability is the compromise of vehicle security through unauthorized access or disarming of the car alarm system. Attackers capturing authentication data can perform replay or cloning attacks, bypassing the alarm without triggering alerts. This can lead to vehicle theft, unauthorized entry, or tampering. For organizations managing fleets or high-value vehicles equipped with the KE700 system, this vulnerability increases risk exposure and potential financial losses. Additionally, the breach of authentication data could undermine user trust in the product and vendor. Although the attack requires physical proximity and specialized equipment, the widespread availability of SDRs lowers the barrier for attackers. The vulnerability does not affect system availability but significantly impacts confidentiality and integrity of the authentication process.

Mitigation Recommendations

Micca Auto Electronics should urgently develop and release firmware updates that implement strong encryption and mutual authentication for RF communications to prevent interception and replay attacks. Users and organizations should monitor vendor communications for patches and apply them promptly. In the interim, physical security measures such as parking vehicles in secure, RF-shielded areas or garages can reduce exposure. Employing additional security layers like steering wheel locks or GPS tracking can mitigate theft risk. Security audits of deployed KE700 systems should be conducted to assess exposure. Organizations should consider replacing vulnerable alarm systems with products that use encrypted RF protocols. Training security personnel to recognize and respond to suspicious RF activity around vehicles may also help detect exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
ASRG
Date Reserved
2026-02-15T10:49:21.601Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69925668bda29fb02fd3ee5f

Added to database: 2/15/2026, 11:27:36 PM

Last enriched: 2/24/2026, 12:02:34 AM

Last updated: 4/6/2026, 10:34:17 PM

Views: 96

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses