Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2026-0715

Summary
Assigner-Moxa
Assigner Org ID-2e0a0ee2-d866-482a-9f5e-ac03d156dbaa
Published At-05 Feb, 2026 | 17:01
Updated At-05 Feb, 2026 | 17:34
Rejected At-
Credits

Moxa Arm-based industrial computers running Moxa Industrial Linux Secure use a device-unique bootloader password provided on the device. An attacker with physical access to the device could use this information to access the bootloader menu via a serial interface.  Access to the bootloader menu does not allow full system takeover or privilege escalation. The bootloader enforces digital signature verification and only permits flashing of Moxa-signed images. As a result, an attacker cannot install malicious firmware or execute arbitrary code. The primary impact is limited to a potential temporary denial-of-service condition if a valid image is reflashed. Remote exploitation is not possible.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Moxa
Assigner Org ID:2e0a0ee2-d866-482a-9f5e-ac03d156dbaa
Published At:05 Feb, 2026 | 17:01
Updated At:05 Feb, 2026 | 17:34
Rejected At:
▼CVE Numbering Authority (CNA)

Moxa Arm-based industrial computers running Moxa Industrial Linux Secure use a device-unique bootloader password provided on the device. An attacker with physical access to the device could use this information to access the bootloader menu via a serial interface.  Access to the bootloader menu does not allow full system takeover or privilege escalation. The bootloader enforces digital signature verification and only permits flashing of Moxa-signed images. As a result, an attacker cannot install malicious firmware or execute arbitrary code. The primary impact is limited to a potential temporary denial-of-service condition if a valid image is reflashed. Remote exploitation is not possible.

Affected Products
Vendor
Moxa Inc.Moxa
Product
UC-1200A Series
Default Status
unaffected
Versions
Affected
  • From 1.0 through 1.4 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-522CWE-522: Insufficiently Protected Credentials
Type: CWE
CWE ID: CWE-522
Description: CWE-522: Insufficiently Protected Credentials
Metrics
VersionBase scoreBase severityVector
4.07.0HIGH
CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Version: 4.0
Base score: 7.0
Base severity: HIGH
Vector:
CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-102CAPEC-102: Session Sidejacking
CAPEC ID: CAPEC-102
Description: CAPEC-102: Session Sidejacking
Solutions

Refer to  https://www.moxa.com/en/support/product-support/security-advisory/mpsa-255121-cve-2026-0714-cve-2026... https://www.moxa.com/en/support/product-support/security-advisory/mpsa-255121-cve-2026-0714-cve-2026-0715-multiple-vulnerabilities-in-industrial-computers

Configurations

Workarounds

Exploits

Credits

finder
Cyloq
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.moxa.com/en/support/product-support/security-advisory/mpsa-255121-cve-2026-0714-cve-2026-0715-multiple-vulnerabilities-in-industrial-computers
vendor-advisory
Hyperlink: https://www.moxa.com/en/support/product-support/security-advisory/mpsa-255121-cve-2026-0714-cve-2026-0715-multiple-vulnerabilities-in-industrial-computers
Resource:
vendor-advisory
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:psirt@moxa.com
Published At:05 Feb, 2026 | 17:16
Updated At:05 Feb, 2026 | 20:47

Moxa Arm-based industrial computers running Moxa Industrial Linux Secure use a device-unique bootloader password provided on the device. An attacker with physical access to the device could use this information to access the bootloader menu via a serial interface.  Access to the bootloader menu does not allow full system takeover or privilege escalation. The bootloader enforces digital signature verification and only permits flashing of Moxa-signed images. As a result, an attacker cannot install malicious firmware or execute arbitrary code. The primary impact is limited to a potential temporary denial-of-service condition if a valid image is reflashed. Remote exploitation is not possible.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.07.0HIGH
CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Secondary
Version: 4.0
Base score: 7.0
Base severity: HIGH
Vector:
CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-522Secondarypsirt@moxa.com
CWE ID: CWE-522
Type: Secondary
Source: psirt@moxa.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.moxa.com/en/support/product-support/security-advisory/mpsa-255121-cve-2026-0714-cve-2026-0715-multiple-vulnerabilities-in-industrial-computerspsirt@moxa.com
N/A
Hyperlink: https://www.moxa.com/en/support/product-support/security-advisory/mpsa-255121-cve-2026-0714-cve-2026-0715-multiple-vulnerabilities-in-industrial-computers
Source: psirt@moxa.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

3Records found

CVE-2026-0714
Matching Score-8
Assigner-Moxa Inc.
ShareView Details
Matching Score-8
Assigner-Moxa Inc.
CVSS Score-7||HIGH
EPSS-0.01% / 0.32%
||
7 Day CHG-0.00%
Published-05 Feb, 2026 | 16:58
Updated-18 Feb, 2026 | 17:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A physical attack vulnerability exists in certain Moxa industrial computers using TPM-backed LUKS full-disk encryption on Moxa Industrial Linux 3, where the discrete TPM is connected to the CPU via an SPI bus. Exploitation requires invasive physical access, including opening the device and attaching external equipment to the SPI bus to capture TPM communications. If successful, the captured data may allow offline decryption of eMMC contents. This attack cannot be performed through brief or opportunistic physical access and requires extended physical access, possession of the device, appropriate equipment, and sufficient time for signal capture and analysis. Remote exploitation is not possible.

Action-Not Available
Vendor-Moxa Inc.
Product-v2406c-kl7-ct-t_firmwarev2406c-wl7-t_firmwareuc-3434a-t-lte-wifi_firmwareuc-4414a-i-t_firmwarev2406c-wl7-tv2406c-kl5-tuc-4454a-t-5g_firmwareuc-2222a-tuc-4430a-tuc-1222auc-4450a-t-5guc-8220-t-lx-ap-s_firmwareuc-4430a-t_firmwareuc-4410a-t_firmwarev2406c-kl5-t_firmwarev2406c-wl7-ct-tuc-3434a-t-lte-wifiuc-3430a-t-lte-wifiuc-2222a-t_firmwareuc-4450a-t-5g_firmwarev2406c-kl3-t_firmwarev1222-w-ct-t_firmwarev2406c-kl1-tv2406c-wl7-ct-t_firmwareuc-8220-t-lx_firmwarev2406c-kl7-tv1202-ct-tv2406c-kl1-t_firmwareuc-4410a-tv2406c-wl1-tuc-2222a-t-eu_firmwareuc-8220-t-lxuc-2222a-t-us_firmwareuc-8220-t-lx-us-sv2406c-wl5-t_firmwarev1222-ct-tuc-8220-t-lx-eu-s_firmwareuc-3424a-t-lte_firmwarev2406c-kl7-t_firmwareuc-8220-t-lx-us-s_firmwarev2406c-kl7-ct-tuc-4434a-i-t_firmwareuc-2222a-t-usuc-2222a-t-apuc-3430a-t-lte-wifi_firmwarev2406c-kl1-ct-tv2406c-wl3-t_firmwareuc-3420a-t-lteuc-3420a-t-lte_firmwarev2406c-wl1-ct-tuc-2222a-t-ap_firmwareuc-4434a-i-tuc-8220-t-lx-eu-suc-8210-t-lx-s_firmwarev2406c-kl1-ct-t_firmwareuc-2222a-t-euuc-3424a-t-ltev2406c-wl1-t_firmwareuc-4454a-t-5guc-8210-t-lx-suc-1222a_firmwarev2406c-wl1-ct-t_firmwareuc-8220-t-lx-ap-suc-4414a-i-tv2406c-wl3-tv1222-ct-t_firmwarev1222-w-ct-tv2406c-wl5-tv1202-ct-t_firmwarev2406c-kl3-tUC-1200A Series
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2025-15017
Matching Score-8
Assigner-Moxa Inc.
ShareView Details
Matching Score-8
Assigner-Moxa Inc.
CVSS Score-7||HIGH
EPSS-0.04% / 11.74%
||
7 Day CHG~0.00%
Published-31 Dec, 2025 | 07:44
Updated-31 Dec, 2025 | 20:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability exists in serial device servers where active debug code remains enabled in the UART interface. An attacker with physical access to the device can directly connect to the UART interface and, without authentication, user interaction, or execution conditions, gain unauthorized access to internal debug functionality. Exploitation is low complexity and allows an attacker to execute privileged operations and access sensitive system resources, resulting in a high impact to the confidentiality, integrity, and availability of the affected device. No security impact to external or dependent systems has been identified.

Action-Not Available
Vendor-Moxa Inc.
Product-NPort 5100 SeriesNPort 5100A SeriesNPort IA5000 SeriesNPort 5200 SeriesNPort 5000AI-M12 SeriesNPort 5600-DT SeriesNPort 5200A SeriesNPort 5600 SeriesNPort 5400 SeriesNPort IA5000A SeriesNPort IA5000-G2 Series
CWE ID-CWE-489
Active Debug Code
CVE-2024-38285
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7||HIGH
EPSS-0.11% / 29.45%
||
7 Day CHG~0.00%
Published-13 Jun, 2024 | 17:26
Updated-02 Aug, 2024 | 04:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Insufficiently Protected Credentials in Motorola Solutions Vigilant Fixed LPR Coms Box (BCAV1F2-C600)

Logs storing credentials are insufficiently protected and can be decoded through the use of open source tools.

Action-Not Available
Vendor-Motorola Solutionsmotorolasolutions
Product-Vigilant Fixed LPR Coms Box (BCAV1F2-C600)vigilant_fixed_lpr_coms_box_bcav1f2_c600
CWE ID-CWE-522
Insufficiently Protected Credentials
Details not found