7

CVE-2026-0715

Moxa Arm-based industrial computers running Moxa Industrial Linux Secure use a device-unique bootloader password provided on the device. An attacker with physical access to the device could use this information to access the bootloader menu via a serial interface.  Access to the bootloader menu does not allow full system takeover or privilege escalation. The bootloader enforces digital signature verification and only permits flashing of Moxa-signed images. As a result, an attacker cannot install malicious firmware or execute arbitrary code. The primary impact is limited to a potential temporary denial-of-service condition if a valid image is reflashed. Remote exploitation is not possible.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
MoxaUc-1222a Firmware Version <= 1.4
   MoxaUc-1222a Version-
MoxaUc-2222a-t-us Firmware Version <= 1.4
   MoxaUc-2222a-t-us Version-
MoxaUc-2222a-t Firmware Version <= 1.4
   MoxaUc-2222a-t Version-
MoxaUc-2222a-t-ap Firmware Version <= 1.4
   MoxaUc-2222a-t-ap Version-
MoxaUc-2222a-t-eu Firmware Version <= 1.4
   MoxaUc-2222a-t-eu Version-
MoxaUc-3434a-t-lte-wifi Firmware Version <= 1.2
   MoxaUc-3434a-t-lte-wifi Version-
MoxaUc-3424a-t-lte Firmware Version <= 1.2
   MoxaUc-3424a-t-lte Version-
MoxaUc-3420a-t-lte Firmware Version <= 1.2
   MoxaUc-3420a-t-lte Version-
MoxaUc-3430a-t-lte-wifi Firmware Version <= 1.2
   MoxaUc-3430a-t-lte-wifi Version-
MoxaUc-4450a-t-5g Firmware Version <= 1.3
   MoxaUc-4450a-t-5g Version-
MoxaUc-4434a-i-t Firmware Version <= 1.3
   MoxaUc-4434a-i-t Version-
MoxaUc-4410a-t Firmware Version <= 1.3
   MoxaUc-4410a-t Version-
MoxaUc-4454a-t-5g Firmware Version <= 1.3
   MoxaUc-4454a-t-5g Version-
MoxaUc-4414a-i-t Firmware Version <= 1.3
   MoxaUc-4414a-i-t Version-
MoxaUc-4430a-t Firmware Version <= 1.3
   MoxaUc-4430a-t Version-
MoxaUc-8210-t-lx-s Firmware Version <= 1.5
   MoxaUc-8210-t-lx-s Version-
MoxaUc-8220-t-lx-eu-s Firmware Version <= 1.5
   MoxaUc-8220-t-lx-eu-s Version-
MoxaUc-8220-t-lx-ap-s Firmware Version <= 1.5
   MoxaUc-8220-t-lx-ap-s Version-
MoxaUc-8220-t-lx-us-s Firmware Version <= 1.5
   MoxaUc-8220-t-lx-us-s Version-
MoxaUc-8220-t-lx Firmware Version <= 1.5
   MoxaUc-8220-t-lx Version-
MoxaV1202-ct-t Firmware Version <= 1.2.0
   MoxaV1202-ct-t Version-
MoxaV1222-ct-t Firmware Version <= 1.2.0
   MoxaV1222-ct-t Version-
MoxaV1222-w-ct-t Firmware Version <= 1.2.0
   MoxaV1222-w-ct-t Version-
MoxaV2406c-kl7-ct-t Firmware Version <= 1.2
   MoxaV2406c-kl7-ct-t Version-
MoxaV2406c-kl7-t Firmware Version <= 1.2
   MoxaV2406c-kl7-t Version-
MoxaV2406c-wl7-ct-t Firmware Version <= 1.2
   MoxaV2406c-wl7-ct-t Version-
MoxaV2406c-wl5-t Firmware Version <= 1.2
   MoxaV2406c-wl5-t Version-
MoxaV2406c-kl1-ct-t Firmware Version <= 1.2
   MoxaV2406c-kl1-ct-t Version-
MoxaV2406c-wl3-t Firmware Version <= 1.2
   MoxaV2406c-wl3-t Version-
MoxaV2406c-wl1-ct-t Firmware Version <= 1.2
   MoxaV2406c-wl1-ct-t Version-
MoxaV2406c-kl3-t Firmware Version <= 1.2
   MoxaV2406c-kl3-t Version-
MoxaV2406c-wl1-t Firmware Version <= 1.2
   MoxaV2406c-wl1-t Version-
MoxaV2406c-kl1-t Firmware Version <= 1.2
   MoxaV2406c-kl1-t Version-
MoxaV2406c-wl7-t Firmware Version <= 1.2
   MoxaV2406c-wl7-t Version-
MoxaV2406c-kl5-t Firmware Version <= 1.2
   MoxaV2406c-kl5-t Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.062
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.8 0.9 5.9
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
psirt@moxa.com 7 0 0
CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
CWE-522 Insufficiently Protected Credentials

The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.