CVE-2026-0715

MEDIUM

Moxa Arm-based - Info Disclosure

Title source: llm
STIX 2.1

Description

Moxa Arm-based industrial computers running Moxa Industrial Linux Secure use a device-unique bootloader password provided on the device. An attacker with physical access to the device could use this information to access the bootloader menu via a serial interface.  Access to the bootloader menu does not allow full system takeover or privilege escalation. The bootloader enforces digital signature verification and only permits flashing of Moxa-signed images. As a result, an attacker cannot install malicious firmware or execute arbitrary code. The primary impact is limited to a potential temporary denial-of-service condition if a valid image is reflashed. Remote exploitation is not possible.

Scores

CVSS v3 6.8
EPSS 0.0001
EPSS Percentile 1.2%
Attack Vector PHYSICAL
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-522
Status published
Products (35)
moxa/uc-1222a_firmware < 1.4
moxa/uc-2222a-t-ap_firmware < 1.4
moxa/uc-2222a-t-eu_firmware < 1.4
moxa/uc-2222a-t-us_firmware < 1.4
moxa/uc-2222a-t_firmware < 1.4
moxa/uc-3420a-t-lte_firmware < 1.2
moxa/uc-3424a-t-lte_firmware < 1.2
moxa/uc-3430a-t-lte-wifi_firmware < 1.2
moxa/uc-3434a-t-lte-wifi_firmware < 1.2
moxa/uc-4410a-t_firmware < 1.3
... and 25 more
Published Feb 05, 2026
Tracked Since Feb 18, 2026