Home

Description

Moxa Arm-based industrial computers running Moxa Industrial Linux Secure use a device-unique bootloader password provided on the device. An attacker with physical access to the device could use this information to access the bootloader menu via a serial interface. Access to the bootloader menu does not allow full system takeover or privilege escalation. The bootloader enforces digital signature verification and only permits flashing of Moxa-signed images. As a result, an attacker cannot install malicious firmware or execute arbitrary code. The primary impact is limited to a potential temporary denial-of-service condition if a valid image is reflashed. Remote exploitation is not possible.

PUBLISHED Reserved 2026-01-08 | Published 2026-02-05 | Updated 2026-02-05 | Assigner Moxa




HIGH: 7.0CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-522: Insufficiently Protected Credentials

Product status

Default status
unaffected

1.0 (custom)
affected

Credits

Cyloq finder

References

www.moxa.com/...iple-vulnerabilities-in-industrial-computers vendor-advisory

cve.org (CVE-2026-0715)

nvd.nist.gov (CVE-2026-0715)

Download JSON