CVE-2026-0715
Severity CVSS v4.0:
HIGH
Type:
CWE-522
Insufficiently Protected Credentials
Publication date:
05/02/2026
Last modified:
18/02/2026
Description
Moxa Arm-based industrial computers running Moxa Industrial Linux Secure use a device-unique bootloader password provided on the device. An attacker with physical access to the device could use this information to access the bootloader menu via a serial interface. Access to the bootloader menu does not allow full system takeover or privilege escalation. The bootloader enforces digital signature verification and only permits flashing of Moxa-signed images. As a result, an attacker cannot install malicious firmware or execute arbitrary code. The primary impact is limited to a potential temporary denial-of-service condition if a valid image is reflashed. Remote exploitation is not possible.
Impact
Base Score 4.0
7.00
Severity 4.0
HIGH
Base Score 3.x
6.80
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:moxa:uc-1222a_firmware:*:*:*:*:*:*:*:* | 1.4 (including) | |
| cpe:2.3:h:moxa:uc-1222a:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:moxa:uc-2222a-t-us_firmware:*:*:*:*:*:*:*:* | 1.4 (including) | |
| cpe:2.3:h:moxa:uc-2222a-t-us:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:moxa:uc-2222a-t_firmware:*:*:*:*:*:*:*:* | 1.4 (including) | |
| cpe:2.3:h:moxa:uc-2222a-t:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:moxa:uc-2222a-t-ap_firmware:*:*:*:*:*:*:*:* | 1.4 (including) | |
| cpe:2.3:h:moxa:uc-2222a-t-ap:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:moxa:uc-2222a-t-eu_firmware:*:*:*:*:*:*:*:* | 1.4 (including) | |
| cpe:2.3:h:moxa:uc-2222a-t-eu:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:moxa:uc-3434a-t-lte-wifi_firmware:*:*:*:*:*:*:*:* | 1.2 (including) | |
| cpe:2.3:h:moxa:uc-3434a-t-lte-wifi:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:moxa:uc-3424a-t-lte_firmware:*:*:*:*:*:*:*:* | 1.2 (including) | |
| cpe:2.3:h:moxa:uc-3424a-t-lte:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:moxa:uc-3420a-t-lte_firmware:*:*:*:*:*:*:*:* | 1.2 (including) |
To consult the complete list of CPE names with products and versions, see this page



