CVE-2026-0715
MEDIUMMoxa Arm-based - Info Disclosure
Title source: llmDescription
Moxa Arm-based industrial computers running Moxa Industrial Linux Secure use a device-unique bootloader password provided on the device. An attacker with physical access to the device could use this information to access the bootloader menu via a serial interface. Access to the bootloader menu does not allow full system takeover or privilege escalation. The bootloader enforces digital signature verification and only permits flashing of Moxa-signed images. As a result, an attacker cannot install malicious firmware or execute arbitrary code. The primary impact is limited to a potential temporary denial-of-service condition if a valid image is reflashed. Remote exploitation is not possible.
Scores
CVSS v3
6.8
EPSS
0.0003
EPSS Percentile
7.2%
Attack Vector
PHYSICAL
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Classification
CWE
CWE-522
Status
published
Affected Products (35)
moxa/uc-1222a_firmware
< 1.4
moxa/uc-2222a-t-us_firmware
< 1.4
moxa/uc-2222a-t_firmware
< 1.4
moxa/uc-2222a-t-ap_firmware
< 1.4
moxa/uc-2222a-t-eu_firmware
< 1.4
moxa/uc-3434a-t-lte-wifi_firmware
< 1.2
moxa/uc-3424a-t-lte_firmware
< 1.2
moxa/uc-3420a-t-lte_firmware
< 1.2
moxa/uc-3430a-t-lte-wifi_firmware
< 1.2
moxa/uc-4450a-t-5g_firmware
< 1.3
moxa/uc-4434a-i-t_firmware
< 1.3
moxa/uc-4410a-t_firmware
< 1.3
moxa/uc-4454a-t-5g_firmware
< 1.3
moxa/uc-4414a-i-t_firmware
< 1.3
moxa/uc-4430a-t_firmware
< 1.3
... and 20 more
Timeline
Published
Feb 05, 2026
Tracked Since
Feb 18, 2026