Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2026-0714

Summary
Assigner-Moxa
Assigner Org ID-2e0a0ee2-d866-482a-9f5e-ac03d156dbaa
Published At-05 Feb, 2026 | 16:58
Updated At-05 Feb, 2026 | 17:28
Rejected At-
Credits

A physical attack vulnerability exists in certain Moxa industrial computers using TPM-backed LUKS full-disk encryption on Moxa Industrial Linux 3, where the discrete TPM is connected to the CPU via an SPI bus. Exploitation requires invasive physical access, including opening the device and attaching external equipment to the SPI bus to capture TPM communications. If successful, the captured data may allow offline decryption of eMMC contents. This attack cannot be performed through brief or opportunistic physical access and requires extended physical access, possession of the device, appropriate equipment, and sufficient time for signal capture and analysis. Remote exploitation is not possible.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Moxa
Assigner Org ID:2e0a0ee2-d866-482a-9f5e-ac03d156dbaa
Published At:05 Feb, 2026 | 16:58
Updated At:05 Feb, 2026 | 17:28
Rejected At:
▼CVE Numbering Authority (CNA)

A physical attack vulnerability exists in certain Moxa industrial computers using TPM-backed LUKS full-disk encryption on Moxa Industrial Linux 3, where the discrete TPM is connected to the CPU via an SPI bus. Exploitation requires invasive physical access, including opening the device and attaching external equipment to the SPI bus to capture TPM communications. If successful, the captured data may allow offline decryption of eMMC contents. This attack cannot be performed through brief or opportunistic physical access and requires extended physical access, possession of the device, appropriate equipment, and sufficient time for signal capture and analysis. Remote exploitation is not possible.

Affected Products
Vendor
Moxa Inc.Moxa
Product
UC-1200A Series
Default Status
unaffected
Versions
Affected
  • From 1.0 through 1.4 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-319CWE-319: Cleartext Transmission of Sensitive Information
Type: CWE
CWE ID: CWE-319
Description: CWE-319: Cleartext Transmission of Sensitive Information
Metrics
VersionBase scoreBase severityVector
4.07.0HIGH
CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Version: 4.0
Base score: 7.0
Base severity: HIGH
Vector:
CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-401CAPEC-401: Physically Hacking Hardware
CAPEC ID: CAPEC-401
Description: CAPEC-401: Physically Hacking Hardware
Solutions

Refer to  https://www.moxa.com/en/support/product-support/security-advisory/mpsa-255121-cve-2026-0714-cve-2026... https://www.moxa.com/en/support/product-support/security-advisory/mpsa-255121-cve-2026-0714-cve-2026-0715-multiple-vulnerabilities-in-industrial-computers

Configurations

Workarounds

Exploits

Credits

finder
Cyloq
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.moxa.com/en/support/product-support/security-advisory/mpsa-255121-cve-2026-0714-cve-2026-0715-multiple-vulnerabilities-in-industrial-computers
vendor-advisory
Hyperlink: https://www.moxa.com/en/support/product-support/security-advisory/mpsa-255121-cve-2026-0714-cve-2026-0715-multiple-vulnerabilities-in-industrial-computers
Resource:
vendor-advisory
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:psirt@moxa.com
Published At:05 Feb, 2026 | 17:16
Updated At:18 Feb, 2026 | 17:55

A physical attack vulnerability exists in certain Moxa industrial computers using TPM-backed LUKS full-disk encryption on Moxa Industrial Linux 3, where the discrete TPM is connected to the CPU via an SPI bus. Exploitation requires invasive physical access, including opening the device and attaching external equipment to the SPI bus to capture TPM communications. If successful, the captured data may allow offline decryption of eMMC contents. This attack cannot be performed through brief or opportunistic physical access and requires extended physical access, possession of the device, appropriate equipment, and sufficient time for signal capture and analysis. Remote exploitation is not possible.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.07.0HIGH
CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Primary3.16.8MEDIUM
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 4.0
Base score: 7.0
Base severity: HIGH
Vector:
CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Primary
Version: 3.1
Base score: 6.8
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Moxa Inc.
moxa
>>uc-1222a_firmware>>Versions up to 1.4(inclusive)
cpe:2.3:o:moxa:uc-1222a_firmware:*:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>uc-1222a>>-
cpe:2.3:h:moxa:uc-1222a:-:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>uc-2222a-t-us_firmware>>Versions up to 1.4(inclusive)
cpe:2.3:o:moxa:uc-2222a-t-us_firmware:*:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>uc-2222a-t-us>>-
cpe:2.3:h:moxa:uc-2222a-t-us:-:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>uc-2222a-t_firmware>>Versions up to 1.4(inclusive)
cpe:2.3:o:moxa:uc-2222a-t_firmware:*:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>uc-2222a-t>>-
cpe:2.3:h:moxa:uc-2222a-t:-:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>uc-2222a-t-ap_firmware>>Versions up to 1.4(inclusive)
cpe:2.3:o:moxa:uc-2222a-t-ap_firmware:*:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>uc-2222a-t-ap>>-
cpe:2.3:h:moxa:uc-2222a-t-ap:-:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>uc-2222a-t-eu_firmware>>Versions up to 1.4(inclusive)
cpe:2.3:o:moxa:uc-2222a-t-eu_firmware:*:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>uc-2222a-t-eu>>-
cpe:2.3:h:moxa:uc-2222a-t-eu:-:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>uc-3434a-t-lte-wifi_firmware>>Versions up to 1.2(inclusive)
cpe:2.3:o:moxa:uc-3434a-t-lte-wifi_firmware:*:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>uc-3434a-t-lte-wifi>>-
cpe:2.3:h:moxa:uc-3434a-t-lte-wifi:-:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>uc-3424a-t-lte_firmware>>Versions up to 1.2(inclusive)
cpe:2.3:o:moxa:uc-3424a-t-lte_firmware:*:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>uc-3424a-t-lte>>-
cpe:2.3:h:moxa:uc-3424a-t-lte:-:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>uc-3420a-t-lte_firmware>>Versions up to 1.2(inclusive)
cpe:2.3:o:moxa:uc-3420a-t-lte_firmware:*:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>uc-3420a-t-lte>>-
cpe:2.3:h:moxa:uc-3420a-t-lte:-:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>uc-3430a-t-lte-wifi_firmware>>Versions up to 1.2(inclusive)
cpe:2.3:o:moxa:uc-3430a-t-lte-wifi_firmware:*:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>uc-3430a-t-lte-wifi>>-
cpe:2.3:h:moxa:uc-3430a-t-lte-wifi:-:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>uc-4450a-t-5g_firmware>>Versions up to 1.3(inclusive)
cpe:2.3:o:moxa:uc-4450a-t-5g_firmware:*:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>uc-4450a-t-5g>>-
cpe:2.3:h:moxa:uc-4450a-t-5g:-:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>uc-4434a-i-t_firmware>>Versions up to 1.3(inclusive)
cpe:2.3:o:moxa:uc-4434a-i-t_firmware:*:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>uc-4434a-i-t>>-
cpe:2.3:h:moxa:uc-4434a-i-t:-:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>uc-4410a-t_firmware>>Versions up to 1.3(inclusive)
cpe:2.3:o:moxa:uc-4410a-t_firmware:*:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>uc-4410a-t>>-
cpe:2.3:h:moxa:uc-4410a-t:-:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>uc-4454a-t-5g_firmware>>Versions up to 1.3(inclusive)
cpe:2.3:o:moxa:uc-4454a-t-5g_firmware:*:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>uc-4454a-t-5g>>-
cpe:2.3:h:moxa:uc-4454a-t-5g:-:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>uc-4414a-i-t_firmware>>Versions up to 1.3(inclusive)
cpe:2.3:o:moxa:uc-4414a-i-t_firmware:*:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>uc-4414a-i-t>>-
cpe:2.3:h:moxa:uc-4414a-i-t:-:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>uc-4430a-t_firmware>>Versions up to 1.3(inclusive)
cpe:2.3:o:moxa:uc-4430a-t_firmware:*:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>uc-4430a-t>>-
cpe:2.3:h:moxa:uc-4430a-t:-:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>uc-8210-t-lx-s_firmware>>Versions up to 1.5(inclusive)
cpe:2.3:o:moxa:uc-8210-t-lx-s_firmware:*:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>uc-8210-t-lx-s>>-
cpe:2.3:h:moxa:uc-8210-t-lx-s:-:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>uc-8220-t-lx-eu-s_firmware>>Versions up to 1.5(inclusive)
cpe:2.3:o:moxa:uc-8220-t-lx-eu-s_firmware:*:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>uc-8220-t-lx-eu-s>>-
cpe:2.3:h:moxa:uc-8220-t-lx-eu-s:-:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>uc-8220-t-lx-ap-s_firmware>>Versions up to 1.5(inclusive)
cpe:2.3:o:moxa:uc-8220-t-lx-ap-s_firmware:*:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>uc-8220-t-lx-ap-s>>-
cpe:2.3:h:moxa:uc-8220-t-lx-ap-s:-:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>uc-8220-t-lx-us-s_firmware>>Versions up to 1.5(inclusive)
cpe:2.3:o:moxa:uc-8220-t-lx-us-s_firmware:*:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>uc-8220-t-lx-us-s>>-
cpe:2.3:h:moxa:uc-8220-t-lx-us-s:-:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>uc-8220-t-lx_firmware>>Versions up to 1.5(inclusive)
cpe:2.3:o:moxa:uc-8220-t-lx_firmware:*:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>uc-8220-t-lx>>-
cpe:2.3:h:moxa:uc-8220-t-lx:-:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>v1202-ct-t_firmware>>Versions up to 1.2.0(inclusive)
cpe:2.3:o:moxa:v1202-ct-t_firmware:*:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>v1202-ct-t>>-
cpe:2.3:h:moxa:v1202-ct-t:-:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>v1222-ct-t_firmware>>Versions up to 1.2.0(inclusive)
cpe:2.3:o:moxa:v1222-ct-t_firmware:*:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>v1222-ct-t>>-
cpe:2.3:h:moxa:v1222-ct-t:-:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>v1222-w-ct-t_firmware>>Versions up to 1.2.0(inclusive)
cpe:2.3:o:moxa:v1222-w-ct-t_firmware:*:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>v1222-w-ct-t>>-
cpe:2.3:h:moxa:v1222-w-ct-t:-:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>v2406c-kl7-ct-t_firmware>>Versions up to 1.2(inclusive)
cpe:2.3:o:moxa:v2406c-kl7-ct-t_firmware:*:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>v2406c-kl7-ct-t>>-
cpe:2.3:h:moxa:v2406c-kl7-ct-t:-:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>v2406c-kl7-t_firmware>>Versions up to 1.2(inclusive)
cpe:2.3:o:moxa:v2406c-kl7-t_firmware:*:*:*:*:*:*:*:*
Moxa Inc.
moxa
>>v2406c-kl7-t>>-
cpe:2.3:h:moxa:v2406c-kl7-t:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-319Secondarypsirt@moxa.com
CWE ID: CWE-319
Type: Secondary
Source: psirt@moxa.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.moxa.com/en/support/product-support/security-advisory/mpsa-255121-cve-2026-0714-cve-2026-0715-multiple-vulnerabilities-in-industrial-computerspsirt@moxa.com
Vendor Advisory
Hyperlink: https://www.moxa.com/en/support/product-support/security-advisory/mpsa-255121-cve-2026-0714-cve-2026-0715-multiple-vulnerabilities-in-industrial-computers
Source: psirt@moxa.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

18Records found

CVE-2026-0715
Matching Score-8
Assigner-Moxa Inc.
ShareView Details
Matching Score-8
Assigner-Moxa Inc.
CVSS Score-7||HIGH
EPSS-0.03% / 6.14%
||
7 Day CHG~0.00%
Published-05 Feb, 2026 | 17:01
Updated-05 Feb, 2026 | 20:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Moxa Arm-based industrial computers running Moxa Industrial Linux Secure use a device-unique bootloader password provided on the device. An attacker with physical access to the device could use this information to access the bootloader menu via a serial interface.  Access to the bootloader menu does not allow full system takeover or privilege escalation. The bootloader enforces digital signature verification and only permits flashing of Moxa-signed images. As a result, an attacker cannot install malicious firmware or execute arbitrary code. The primary impact is limited to a potential temporary denial-of-service condition if a valid image is reflashed. Remote exploitation is not possible.

Action-Not Available
Vendor-Moxa Inc.
Product-UC-1200A Series
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2023-1257
Matching Score-8
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-8
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.6||HIGH
EPSS-0.11% / 29.36%
||
7 Day CHG~0.00%
Published-07 Mar, 2023 | 16:54
Updated-16 Jan, 2025 | 21:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE-2023-1257

An attacker with physical access to the affected Moxa UC Series devices can initiate a restart of the device and gain access to its BIOS. Command line options can then be altered, allowing the attacker to access the terminal. From the terminal, the attacker can modify the device’s authentication files to create a new user and gain full access to the system.

Action-Not Available
Vendor-Moxa Inc.
Product-uc-8210-t-lx-suc-8131-lxuc-5101-t-lxuc-2114-t-lxuc-8540-lxuc-8220-t-lxuc-2102-t-lxuc-8112-lx_firmwareuc-3121-t-ap-lx_firmwareuc-8540-t-lxuc-8540-t-ct-lxuc-8112-me-t-lx1uc-8540-t-ct-lx_firmwareuc-8220-t-lx_firmwareuc-8580-t-lxuc-8540-t-lx_firmwareuc-2102-lx_firmwareuc-3121-t-us-lxuc-8410a-t-lx_firmwareuc-8580-t-ct-lx_firmwareuc-8580-t-lx_firmwareuc-3111-t-eu-lx_firmwareuc-8220-t-lx-eu-s_firmwareuc-5111-lxuc-3101-t-ap-lxuc-2112-lxuc-8132-lx_firmwareuc-5111-t-lx_firmwareuc-8580-q-lxuc-5111-t-lxuc-8112-me-t-lx1_firmwareuc-8410a-nw-t-lxuc-8210-t-lx-s_firmwareuc-3111-t-eu-lxuc-3111-t-eu-lx-nwuc-3101-t-eu-lx_firmwareuc-2102-t-lx_firmwareuc-5102-lxuc-3111-t-ap-lxuc-5101-lx_firmwareuc-2104-lx_firmwareuc-8220-t-lx-us-s_firmwareuc-8410a-lx_firmwareuc-3111-t-eu-lx-nw_firmwareuc-5112-t-lx_firmwareuc-3121-t-us-lx_firmwareuc-3101-t-us-lxuc-8112a-me-t-lxuc-8162-lxuc-5111-lx_firmwareuc-8580-t-q-lx_firmwareuc-5102-t-lxuc-8580-lxuc-8220-t-lx-ap-s_firmwareuc-2104-lxuc-2114-t-lx_firmwareuc-8580-t-ct-q-lx_firmwareuc-8162-lx_firmwareuc-8112-me-t-lxuc-5112-t-lxuc-3111-t-us-lxuc-8410a-lxuc-3111-t-ap-lx-nw_firmwareuc-3111-t-us-lx_firmwareuc-5112-lx_firmwareuc-3101-t-us-lx_firmwareuc-3101-t-eu-lxuc-5112-lxuc-8112a-me-t-lx_firmwareuc-8580-q-lx_firmwareuc-5102-t-lx_firmwareuc-8580-lx_firmwareuc-5102-lx_firmwareuc-8112-lxuc-3111-t-ap-lx-nwuc-8580-t-ct-q-lxuc-3121-t-eu-lxuc-8220-t-lx-eu-suc-2101-lxuc-8220-t-lx-us-suc-3121-t-eu-lx_firmwareuc-5101-t-lx_firmwareuc-8580-t-q-lxuc-3101-t-ap-lx_firmwareuc-5101-lxuc-8220-t-lx-ap-suc-8131-lx_firmwareuc-3111-t-ap-lx_firmwareuc-8410a-t-lxuc-2112-lx_firmwareuc-2102-lxuc-8132-lxuc-8220-t-lx-suc-8410a-nw-t-lx_firmwareuc-3121-t-ap-lxuc-2101-lx_firmwareuc-2116-t-lx_firmwareuc-8540-lx_firmwareuc-8410a-nw-lx_firmwareuc-8112-me-t-lx_firmwareuc-8410a-nw-lxuc-8220-t-lx-s_firmwareuc-2111-lxuc-3111-t-us-lx-nw_firmwareuc-2116-t-lxuc-2111-lx_firmwareuc-3111-t-us-lx-nwuc-8580-t-ct-lxUC-3100 SeriesUC-5100 SeriesUC-8100 SeriesUC-2100 SeriesUC-8580 SeriesUC-8540 SeriesUC-8200 SeriesUC-2100-W SeriesUC-8410A SeriesUC-8100A-ME-T Series
CVE-2025-15017
Matching Score-8
Assigner-Moxa Inc.
ShareView Details
Matching Score-8
Assigner-Moxa Inc.
CVSS Score-7||HIGH
EPSS-0.04% / 11.74%
||
7 Day CHG~0.00%
Published-31 Dec, 2025 | 07:44
Updated-31 Dec, 2025 | 20:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability exists in serial device servers where active debug code remains enabled in the UART interface. An attacker with physical access to the device can directly connect to the UART interface and, without authentication, user interaction, or execution conditions, gain unauthorized access to internal debug functionality. Exploitation is low complexity and allows an attacker to execute privileged operations and access sensitive system resources, resulting in a high impact to the confidentiality, integrity, and availability of the affected device. No security impact to external or dependent systems has been identified.

Action-Not Available
Vendor-Moxa Inc.
Product-NPort 5100 SeriesNPort 5100A SeriesNPort IA5000 SeriesNPort 5200 SeriesNPort 5000AI-M12 SeriesNPort 5600-DT SeriesNPort 5200A SeriesNPort 5600 SeriesNPort 5400 SeriesNPort IA5000A SeriesNPort IA5000-G2 Series
CWE ID-CWE-489
Active Debug Code
CVE-2023-5035
Matching Score-6
Assigner-Moxa Inc.
ShareView Details
Matching Score-6
Assigner-Moxa Inc.
CVSS Score-3.1||LOW
EPSS-0.10% / 28.25%
||
7 Day CHG~0.00%
Published-02 Nov, 2023 | 16:11
Updated-05 Sep, 2024 | 14:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cookie Without Secure Flag

A vulnerability has been identified in PT-G503 Series firmware versions prior to v5.2, where the Secure attribute for sensitive cookies in HTTPS sessions is not set, which could cause the cookie to be transmitted in plaintext over an HTTP session. The vulnerability may lead to security risks, potentially exposing user session data to unauthorized access and manipulation.

Action-Not Available
Vendor-Moxa Inc.
Product-eds-g503eds-g503_firmwarePT-G503 Series
CWE ID-CWE-614
Sensitive Cookie in HTTPS Session Without 'Secure' Attribute
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2019-9101
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-0.13% / 32.10%
||
7 Day CHG~0.00%
Published-11 Mar, 2020 | 14:27
Updated-04 Aug, 2024 | 21:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. Sensitive information is sent to the web server in cleartext, which may allow an attacker to discover the credentials if they are able to observe traffic between the web browser and the server.

Action-Not Available
Vendor-n/aMoxa Inc.
Product-mb3180_firmwaremb3270_firmwaremb3480_firmwaremb3270mb3170_firmwaremb3660mb3170mb3280mb3660_firmwaremb3480mb3180mb3280_firmwaren/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2020-6997
Matching Score-6
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-6
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.5||HIGH
EPSS-0.20% / 41.69%
||
7 Day CHG~0.00%
Published-24 Mar, 2020 | 20:31
Updated-04 Aug, 2024 | 09:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Moxa EDS-G516E Series firmware, Version 5.2 or lower, sensitive information is transmitted over some web applications in cleartext.

Action-Not Available
Vendor-n/aMoxa Inc.
Product-eds-g516e_firmwareeds-g516eeds-510e_firmwareeds-510eMoxa EDS-G516E Series firmware, Version 5.2 or lower
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2020-7003
Matching Score-6
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-6
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.5||HIGH
EPSS-0.20% / 41.69%
||
7 Day CHG~0.00%
Published-24 Mar, 2020 | 17:02
Updated-04 Aug, 2024 | 09:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Moxa ioLogik 2500 series firmware, Version 3.0 or lower, and IOxpress configuration utility, Version 2.3.0 or lower, sensitive information is transmitted over some web applications in clear text.

Action-Not Available
Vendor-n/aMoxa Inc.
Product-iologik_2512-wl1-eu-t_firmwareiologik_2542-wl1-jpiologik_2542-wl1-jp-t_firmwareiologik_2512iologik_2512-t_firmwareiologik_2512-tiologik_2542-wl1-jp_firmwareiologik_2512-wl1-jp-t_firmwareiologik_2512-wl1-jp-tiologik_2542_firmwareiologik_2542-wl1-usiologik_2512-wl1-usiologik_2512-hspa-tiologik_2512-wl1-jp_firmwareiologik_2542-wl1-eu_firmwareiologik_2542-hspa_firmwareiologik_2542-wl1-jp-tiologik_2512-wl1-eu-tiologik_2542-t_firmwareiologik_2542-wl1-eu-t_firmwareiologik_2542-wl1-us-tiologik_2512-hspa-t_firmwareiologik_2512_firmwareiologik_2512-wl1-us-t_firmwareiologik_2542-wl1-eu-tiologik_2542-wl1-euiologik_2512-wl1-us-tiologik_2542-wl1-us-t_firmwareiologik_2542-tiologik_2512-wl1-eu_firmwareiologik_2512-wl1-euiologik_2542-hspaiologik_2512-wl1-jpiologik_2512-wl1-us_firmwareiologik_2542-wl1-us_firmwareiologik_2542-hspa-t_firmwareiologik_2512-hspaiologik_2542iologik_2512-hspa_firmwareiologik_2542-hspa-tMoxa ioLogik 2500 series firmware, Version 3.0 or lower, IOxpress configuration utility, Version 2.3.0 or lower
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2020-27184
Matching Score-6
Assigner-Kaspersky
ShareView Details
Matching Score-6
Assigner-Kaspersky
CVSS Score-5.9||MEDIUM
EPSS-0.08% / 24.57%
||
7 Day CHG~0.00%
Published-14 May, 2021 | 12:06
Updated-04 Aug, 2024 | 16:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The NPort IA5000A Series devices use Telnet as one of the network device management services. Telnet does not support the encryption of client-server communications, making it vulnerable to Man-in-the-Middle attacks.

Action-Not Available
Vendor-n/aMoxa Inc.
Product-nport_ia5150a_firmwarenport_ia5450a_firmwarenport_ia5250anport_ia5150anport_ia5250a_firmwarenport_ia5450aNPort IA5000A Series with Telnet enabled
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2020-27185
Matching Score-6
Assigner-Kaspersky
ShareView Details
Matching Score-6
Assigner-Kaspersky
CVSS Score-7.5||HIGH
EPSS-0.20% / 42.05%
||
7 Day CHG~0.00%
Published-14 May, 2021 | 12:06
Updated-04 Aug, 2024 | 16:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cleartext transmission of sensitive information via Moxa Service in NPort IA5000A series serial devices. Successfully exploiting the vulnerability could enable attackers to read authentication data, device configuration, and other sensitive data transmitted over Moxa Service.

Action-Not Available
Vendor-n/aMoxa Inc.
Product-nport_ia5150a_firmwarenport_ia5450a_firmwarenport_ia5250anport_ia5150anport_ia5250a_firmwarenport_ia5450aNPort IA5000A Series with Moxa Service enabled
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2020-25190
Matching Score-6
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-6
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.5||HIGH
EPSS-0.09% / 26.04%
||
7 Day CHG~0.00%
Published-23 Dec, 2020 | 14:07
Updated-16 Sep, 2024 | 21:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MOXA NPort IAW5000A-I/O Series

The built-in WEB server for MOXA NPort IAW5000A-I/O firmware version 2.1 or lower stores and transmits the credentials of third-party services in cleartext.

Action-Not Available
Vendor-Moxa Inc.
Product-nport_iaw5000a-i\/onport_iaw5000a-i\/o_firmwareNPort IAW5000A-I/O
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2019-6526
Matching Score-6
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-6
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.8||CRITICAL
EPSS-0.12% / 31.72%
||
7 Day CHG~0.00%
Published-12 Apr, 2019 | 20:11
Updated-04 Aug, 2024 | 20:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Moxa IKS-G6824A series Versions 4.5 and prior, EDS-405A series Version 3.8 and prior, EDS-408A series Version 3.8 and prior, and EDS-510A series Version 3.8 and prior use plaintext transmission of sensitive data, which may allow an attacker to capture sensitive data such as an administrative password.

Action-Not Available
Vendor-Moxa Inc.
Product-eds-510aeds-408a_firmwareeds-408aeds-510a_firmwareiks-g6824aeds-405a_firmwareiks-g6824a_firmwareeds-405aIKS, EDS
CWE ID-CWE-311
Missing Encryption of Sensitive Data
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2021-4161
Matching Score-6
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-6
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.8||CRITICAL
EPSS-0.13% / 32.05%
||
7 Day CHG~0.00%
Published-27 Dec, 2021 | 18:48
Updated-16 Sep, 2024 | 19:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ICSA-21-357-01 Moxa MGate Protocol Gateways

The affected products contain vulnerable firmware, which could allow an attacker to sniff the traffic and decrypt login credential details. This could give an attacker admin rights through the HTTP web server.

Action-Not Available
Vendor-Moxa Inc.
Product-mgate_mb3280_firmwaremgate_mb3280mgate_mb3180_firmwaremgate_mb3180mgate_mb3480_firmwaremgate_mb3480MGate MB3280 SeriesMGate MB3180 SeriesMGate MB3480 Series
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2023-6094
Matching Score-6
Assigner-Moxa Inc.
ShareView Details
Matching Score-6
Assigner-Moxa Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.09% / 26.33%
||
7 Day CHG~0.00%
Published-31 Dec, 2023 | 09:57
Updated-26 Aug, 2024 | 20:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OnCell G3150A-LTE Series: Web Server Transmits Cleartext Credentials

A vulnerability has been identified in OnCell G3150A-LTE Series firmware versions v1.3 and prior. The vulnerability results from lack of protection for sensitive information during transmission. An attacker eavesdropping on the traffic between the web browser and server may obtain sensitive information. This type of attack could be executed to gather sensitive information or to facilitate a subsequent attack against the target.

Action-Not Available
Vendor-Moxa Inc.
Product-oncell_g3150a-lte_firmwareoncell_g3150a-lteOnCell G3150A-LTE Series
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2022-40693
Matching Score-6
Assigner-Talos
ShareView Details
Matching Score-6
Assigner-Talos
CVSS Score-5.9||MEDIUM
EPSS-0.18% / 38.90%
||
7 Day CHG-0.04%
Published-07 Feb, 2023 | 16:52
Updated-16 Feb, 2023 | 16:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A cleartext transmission vulnerability exists in the web application functionality of Moxa SDS-3008 Series Industrial Ethernet Switch 2.1. A specially-crafted network sniffing can lead to a disclosure of sensitive information. An attacker can sniff network traffic to trigger this vulnerability.

Action-Not Available
Vendor-Moxa Inc.
Product-sds-3008-t_firmwaresds-3008sds-3008_firmwaresds-3008-tSDS-3008 Series Industrial Ethernet Switch
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2018-11421
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-1.11% / 77.78%
||
7 Day CHG~0.00%
Published-03 Jul, 2019 | 15:24
Updated-05 Aug, 2024 | 08:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Moxa OnCell G3100-HSPA Series version 1.6 Build 17100315 and prior use a proprietary monitoring protocol that does not provide confidentiality, integrity, and authenticity security controls. All information is sent in plain text, and can be intercepted and modified. The protocol is vulnerable to remote unauthenticated disclosure of sensitive information, including the administrator's password. Under certain conditions, it's also possible to retrieve additional information, such as content of HTTP requests to the device, or the previously used password, due to memory leakages.

Action-Not Available
Vendor-n/aMoxa Inc.
Product-oncell_g3150-hspa-t_firmwareoncell_g3150-hspaoncell_g3150-hspa_firmwareoncell_g3150-hspa-tn/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2018-11422
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.23% / 45.43%
||
7 Day CHG~0.00%
Published-03 Jul, 2019 | 15:23
Updated-05 Aug, 2024 | 08:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Moxa OnCell G3100-HSPA Series version 1.6 Build 17100315 and prior use a proprietary configuration protocol that does not provide confidentiality, integrity, and authenticity security controls. All information is sent in plain text, and can be intercepted and modified. Any commands (including device reboot, configuration download or upload, or firmware upgrade) are accepted and executed by the device without authentication.

Action-Not Available
Vendor-n/aMoxa Inc.
Product-oncell_g3150-hspa-t_firmwareoncell_g3150-hspaoncell_g3150-hspa_firmwareoncell_g3150-hspa-tn/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2021-40392
Matching Score-6
Assigner-Talos
ShareView Details
Matching Score-6
Assigner-Talos
CVSS Score-5.3||MEDIUM
EPSS-0.15% / 35.21%
||
7 Day CHG~0.00%
Published-14 Apr, 2022 | 19:56
Updated-15 Apr, 2025 | 19:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An information disclosure vulnerability exists in the Web Application functionality of Moxa MXView Series 3.2.4. Network sniffing can lead to a disclosure of sensitive information. An attacker can sniff network traffic to exploit this vulnerability.

Action-Not Available
Vendor-Moxa Inc.
Product-mxviewMXView Series
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2021-20169
Matching Score-4
Assigner-Tenable Network Security, Inc.
ShareView Details
Matching Score-4
Assigner-Tenable Network Security, Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.02% / 5.54%
||
7 Day CHG~0.00%
Published-30 Dec, 2021 | 21:31
Updated-03 Aug, 2024 | 17:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Netgear RAX43 version 1.0.3.96 does not utilize secure communications to the web interface. By default, all communication to/from the device is sent via HTTP, which causes potentially sensitive information (such as usernames and passwords) to be transmitted in cleartext.

Action-Not Available
Vendor-n/aNETGEAR, Inc.
Product-rax43_firmwarerax43Netgear RAX43
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
Details not found