CVE-2026-0715

MEDIUM

Moxa Arm-based - Info Disclosure

Title source: llm

Description

Moxa Arm-based industrial computers running Moxa Industrial Linux Secure use a device-unique bootloader password provided on the device. An attacker with physical access to the device could use this information to access the bootloader menu via a serial interface.  Access to the bootloader menu does not allow full system takeover or privilege escalation. The bootloader enforces digital signature verification and only permits flashing of Moxa-signed images. As a result, an attacker cannot install malicious firmware or execute arbitrary code. The primary impact is limited to a potential temporary denial-of-service condition if a valid image is reflashed. Remote exploitation is not possible.

Scores

CVSS v3 6.8
EPSS 0.0003
EPSS Percentile 7.2%
Attack Vector PHYSICAL
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Classification

CWE
CWE-522
Status published

Affected Products (35)

moxa/uc-1222a_firmware < 1.4
moxa/uc-2222a-t-us_firmware < 1.4
moxa/uc-2222a-t_firmware < 1.4
moxa/uc-2222a-t-ap_firmware < 1.4
moxa/uc-2222a-t-eu_firmware < 1.4
moxa/uc-3434a-t-lte-wifi_firmware < 1.2
moxa/uc-3424a-t-lte_firmware < 1.2
moxa/uc-3420a-t-lte_firmware < 1.2
moxa/uc-3430a-t-lte-wifi_firmware < 1.2
moxa/uc-4450a-t-5g_firmware < 1.3
moxa/uc-4434a-i-t_firmware < 1.3
moxa/uc-4410a-t_firmware < 1.3
moxa/uc-4454a-t-5g_firmware < 1.3
moxa/uc-4414a-i-t_firmware < 1.3
moxa/uc-4430a-t_firmware < 1.3
... and 20 more

Timeline

Published Feb 05, 2026
Tracked Since Feb 18, 2026