CVE-2026-0715

Moxa Arm-based industrial computers running Moxa Industrial Linux Secure use a device-unique bootloader password provided on the device. An attacker with physical access to the device could use this information to access the bootloader menu via a serial interface.  Access to the bootloader menu does not allow full system takeover or privilege escalation. The bootloader enforces digital signature verification and only permits flashing of Moxa-signed images. As a result, an attacker cannot install malicious firmware or execute arbitrary code. The primary impact is limited to a potential temporary denial-of-service condition if a valid image is reflashed. Remote exploitation is not possible.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:moxa:uc-1222a_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-1222a:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:moxa:uc-2222a-t-us_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-2222a-t-us:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:moxa:uc-2222a-t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-2222a-t:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:moxa:uc-2222a-t-ap_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-2222a-t-ap:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:moxa:uc-2222a-t-eu_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-2222a-t-eu:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:moxa:uc-3434a-t-lte-wifi_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-3434a-t-lte-wifi:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:moxa:uc-3424a-t-lte_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-3424a-t-lte:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:moxa:uc-3420a-t-lte_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-3420a-t-lte:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:moxa:uc-3430a-t-lte-wifi_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-3430a-t-lte-wifi:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:moxa:uc-4450a-t-5g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-4450a-t-5g:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:moxa:uc-4434a-i-t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-4434a-i-t:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:moxa:uc-4410a-t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-4410a-t:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:moxa:uc-4454a-t-5g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-4454a-t-5g:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:moxa:uc-4414a-i-t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-4414a-i-t:-:*:*:*:*:*:*:*

Configuration 15 (hide)

AND
cpe:2.3:o:moxa:uc-4430a-t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-4430a-t:-:*:*:*:*:*:*:*

Configuration 16 (hide)

AND
cpe:2.3:o:moxa:uc-8210-t-lx-s_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-8210-t-lx-s:-:*:*:*:*:*:*:*

Configuration 17 (hide)

AND
cpe:2.3:o:moxa:uc-8220-t-lx-eu-s_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-8220-t-lx-eu-s:-:*:*:*:*:*:*:*

Configuration 18 (hide)

AND
cpe:2.3:o:moxa:uc-8220-t-lx-ap-s_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-8220-t-lx-ap-s:-:*:*:*:*:*:*:*

Configuration 19 (hide)

AND
cpe:2.3:o:moxa:uc-8220-t-lx-us-s_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-8220-t-lx-us-s:-:*:*:*:*:*:*:*

Configuration 20 (hide)

AND
cpe:2.3:o:moxa:uc-8220-t-lx_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-8220-t-lx:-:*:*:*:*:*:*:*

Configuration 21 (hide)

AND
cpe:2.3:o:moxa:v1202-ct-t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:v1202-ct-t:-:*:*:*:*:*:*:*

Configuration 22 (hide)

AND
cpe:2.3:o:moxa:v1222-ct-t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:v1222-ct-t:-:*:*:*:*:*:*:*

Configuration 23 (hide)

AND
cpe:2.3:o:moxa:v1222-w-ct-t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:v1222-w-ct-t:-:*:*:*:*:*:*:*

Configuration 24 (hide)

AND
cpe:2.3:o:moxa:v2406c-kl7-ct-t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:v2406c-kl7-ct-t:-:*:*:*:*:*:*:*

Configuration 25 (hide)

AND
cpe:2.3:o:moxa:v2406c-kl7-t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:v2406c-kl7-t:-:*:*:*:*:*:*:*

Configuration 26 (hide)

AND
cpe:2.3:o:moxa:v2406c-wl7-ct-t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:v2406c-wl7-ct-t:-:*:*:*:*:*:*:*

Configuration 27 (hide)

AND
cpe:2.3:o:moxa:v2406c-wl5-t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:v2406c-wl5-t:-:*:*:*:*:*:*:*

Configuration 28 (hide)

AND
cpe:2.3:o:moxa:v2406c-kl1-ct-t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:v2406c-kl1-ct-t:-:*:*:*:*:*:*:*

Configuration 29 (hide)

AND
cpe:2.3:o:moxa:v2406c-wl3-t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:v2406c-wl3-t:-:*:*:*:*:*:*:*

Configuration 30 (hide)

AND
cpe:2.3:o:moxa:v2406c-wl1-ct-t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:v2406c-wl1-ct-t:-:*:*:*:*:*:*:*

Configuration 31 (hide)

AND
cpe:2.3:o:moxa:v2406c-kl3-t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:v2406c-kl3-t:-:*:*:*:*:*:*:*

Configuration 32 (hide)

AND
cpe:2.3:o:moxa:v2406c-wl1-t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:v2406c-wl1-t:-:*:*:*:*:*:*:*

Configuration 33 (hide)

AND
cpe:2.3:o:moxa:v2406c-kl1-t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:v2406c-kl1-t:-:*:*:*:*:*:*:*

Configuration 34 (hide)

AND
cpe:2.3:o:moxa:v2406c-wl7-t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:v2406c-wl7-t:-:*:*:*:*:*:*:*

Configuration 35 (hide)

AND
cpe:2.3:o:moxa:v2406c-kl5-t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:moxa:v2406c-kl5-t:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-02-05 17:16

Updated : 2026-02-18 17:51


NVD link : CVE-2026-0715

Mitre link : CVE-2026-0715

CVE.ORG link : CVE-2026-0715


JSON object : View

Products Affected

moxa

  • uc-8210-t-lx-s
  • uc-8220-t-lx-eu-s
  • v1222-ct-t_firmware
  • uc-2222a-t-us_firmware
  • v2406c-kl1-t
  • v1222-ct-t
  • uc-8220-t-lx_firmware
  • v2406c-kl7-ct-t
  • v2406c-kl3-t
  • uc-8210-t-lx-s_firmware
  • v2406c-kl1-t_firmware
  • uc-2222a-t_firmware
  • v2406c-wl1-t
  • uc-1222a
  • uc-1222a_firmware
  • v2406c-kl7-ct-t_firmware
  • uc-8220-t-lx-eu-s_firmware
  • v2406c-kl3-t_firmware
  • v2406c-kl7-t_firmware
  • uc-2222a-t-ap_firmware
  • v2406c-kl7-t
  • v2406c-kl1-ct-t
  • uc-8220-t-lx-ap-s_firmware
  • uc-4414a-i-t
  • uc-2222a-t-us
  • uc-4434a-i-t_firmware
  • v2406c-wl7-t
  • v2406c-wl1-t_firmware
  • uc-4410a-t
  • uc-4410a-t_firmware
  • v2406c-wl5-t
  • v2406c-kl1-ct-t_firmware
  • uc-2222a-t-ap
  • uc-4414a-i-t_firmware
  • v2406c-wl1-ct-t
  • uc-3434a-t-lte-wifi
  • uc-4454a-t-5g
  • uc-3420a-t-lte
  • v2406c-wl7-ct-t
  • uc-8220-t-lx-ap-s
  • uc-3420a-t-lte_firmware
  • v2406c-wl3-t_firmware
  • v2406c-wl7-t_firmware
  • uc-3434a-t-lte-wifi_firmware
  • v2406c-kl5-t
  • uc-2222a-t
  • v2406c-wl3-t
  • uc-2222a-t-eu_firmware
  • uc-3424a-t-lte
  • uc-3424a-t-lte_firmware
  • uc-4450a-t-5g_firmware
  • uc-4434a-i-t
  • uc-4430a-t
  • uc-2222a-t-eu
  • uc-8220-t-lx
  • uc-3430a-t-lte-wifi_firmware
  • v1202-ct-t
  • v1222-w-ct-t_firmware
  • uc-4454a-t-5g_firmware
  • v1202-ct-t_firmware
  • uc-8220-t-lx-us-s
  • v2406c-wl7-ct-t_firmware
  • v1222-w-ct-t
  • v2406c-kl5-t_firmware
  • v2406c-wl5-t_firmware
  • uc-8220-t-lx-us-s_firmware
  • v2406c-wl1-ct-t_firmware
  • uc-3430a-t-lte-wifi
  • uc-4450a-t-5g
  • uc-4430a-t_firmware
CWE
CWE-522

Insufficiently Protected Credentials