7.0
HIGH CVSS 4.0
CVE-2026-0714
Moxa Industrial Computers TPM SPI Bus Physical Attack Vulnerability
Description

A physical attack vulnerability exists in certain Moxa industrial computers using TPM-backed LUKS full-disk encryption on Moxa Industrial Linux 3, where the discrete TPM is connected to the CPU via an SPI bus. Exploitation requires invasive physical access, including opening the device and attaching external equipment to the SPI bus to capture TPM communications. If successful, the captured data may allow offline decryption of eMMC contents. This attack cannot be performed through brief or opportunistic physical access and requires extended physical access, possession of the device, appropriate equipment, and sufficient time for signal capture and analysis. Remote exploitation is not possible.

INFO

Published Date :

Feb. 5, 2026, 5:16 p.m.

Last Modified :

Feb. 18, 2026, 5:55 p.m.

Remotely Exploit :

No
Affected Products

The following products are affected by CVE-2026-0714 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Moxa uc-8210-t-lx-s_firmware
2 Moxa uc-8220-t-lx_firmware
3 Moxa uc-8220-t-lx-ap-s_firmware
4 Moxa uc-8220-t-lx-eu-s_firmware
5 Moxa uc-8220-t-lx-us-s_firmware
6 Moxa uc-8220-t-lx
7 Moxa uc-8220-t-lx-us-s
8 Moxa uc-8220-t-lx-eu-s
9 Moxa uc-8220-t-lx-ap-s
10 Moxa uc-8210-t-lx-s
11 Moxa uc-1222a_firmware
12 Moxa uc-1222a
13 Moxa uc-2222a-t-us_firmware
14 Moxa uc-2222a-t-us
15 Moxa uc-2222a-t_firmware
16 Moxa uc-2222a-t
17 Moxa uc-2222a-t-ap_firmware
18 Moxa uc-2222a-t-ap
19 Moxa uc-2222a-t-eu_firmware
20 Moxa uc-2222a-t-eu
21 Moxa uc-3434a-t-lte-wifi_firmware
22 Moxa uc-3434a-t-lte-wifi
23 Moxa uc-3424a-t-lte_firmware
24 Moxa uc-3424a-t-lte
25 Moxa uc-3420a-t-lte_firmware
26 Moxa uc-3420a-t-lte
27 Moxa uc-3430a-t-lte-wifi_firmware
28 Moxa uc-3430a-t-lte-wifi
29 Moxa uc-4450a-t-5g_firmware
30 Moxa uc-4450a-t-5g
31 Moxa uc-4434a-i-t_firmware
32 Moxa uc-4434a-i-t
33 Moxa uc-4410a-t_firmware
34 Moxa uc-4410a-t
35 Moxa uc-4454a-t-5g_firmware
36 Moxa uc-4454a-t-5g
37 Moxa uc-4414a-i-t_firmware
38 Moxa uc-4414a-i-t
39 Moxa uc-4430a-t_firmware
40 Moxa uc-4430a-t
41 Moxa v1202-ct-t_firmware
42 Moxa v1202-ct-t
43 Moxa v1222-ct-t_firmware
44 Moxa v1222-ct-t
45 Moxa v1222-w-ct-t_firmware
46 Moxa v1222-w-ct-t
47 Moxa v2406c-kl7-ct-t_firmware
48 Moxa v2406c-kl7-ct-t
49 Moxa v2406c-kl7-t_firmware
50 Moxa v2406c-kl7-t
51 Moxa v2406c-wl7-ct-t_firmware
52 Moxa v2406c-wl7-ct-t
53 Moxa v2406c-wl5-t_firmware
54 Moxa v2406c-wl5-t
55 Moxa v2406c-kl1-ct-t_firmware
56 Moxa v2406c-kl1-ct-t
57 Moxa v2406c-wl3-t_firmware
58 Moxa v2406c-wl3-t
59 Moxa v2406c-wl1-ct-t_firmware
60 Moxa v2406c-wl1-ct-t
61 Moxa v2406c-kl3-t_firmware
62 Moxa v2406c-kl3-t
63 Moxa v2406c-wl1-t_firmware
64 Moxa v2406c-wl1-t
65 Moxa v2406c-kl1-t_firmware
66 Moxa v2406c-kl1-t
67 Moxa v2406c-wl7-t_firmware
68 Moxa v2406c-wl7-t
69 Moxa v2406c-kl5-t_firmware
70 Moxa v2406c-kl5-t
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 MEDIUM [email protected]
CVSS 4.0 HIGH 2e0a0ee2-d866-482a-9f5e-ac03d156dbaa
CVSS 4.0 HIGH [email protected]
Solution
Protect discrete TPM via SPI bus from physical attackers.
  • Harden physical security of devices.
  • Implement tamper detection mechanisms.
  • Disable or monitor SPI bus access.
  • Consider alternative encryption methods.
Public PoC/Exploit Available at Github

CVE-2026-0714 has a 2 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2026-0714.

URL Resource
https://www.moxa.com/en/support/product-support/security-advisory/mpsa-255121-cve-2026-0714-cve-2026-0715-multiple-vulnerabilities-in-industrial-computers Vendor Advisory
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2026-0714 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Saleae Logic 2 HLA plugin that extracts NV index data returned by TPM2_NV_Read from TPM2 SPI bus captures.

Python

Updated: 1 week, 1 day ago
0 stars 1 fork 1 watcher
Born at : Feb. 17, 2026, 6:21 p.m. This repo has been linked 1 different CVEs too.

A repo for TPM sniffing greatness

Updated: 6 days, 8 hours ago
247 stars 23 fork 23 watcher
Born at : Feb. 5, 2024, 8:47 a.m. This repo has been linked 1 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2026-0714 vulnerability anywhere in the article.

  • Daily CyberSecurity
First-Ever TPM Sniffing Attack Extracts LUKS Keys from Industrial Linux Devices

Image: Cyloq While hardware hackers have long demonstrated the ability to extract BitLocker keys by eavesdropping on Windows systems, a new frontier in Trusted Platform Module (TPM) sniffing has just ... Read more

Published Date: Feb 24, 2026 (3 days, 1 hour ago)

The following table lists the changes that have been made to the CVE-2026-0714 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Initial Analysis by [email protected]

    Feb. 18, 2026

    Action Type Old Value New Value
    Added CVSS V3.1 AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:uc-1222a_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.4 OR cpe:2.3:h:moxa:uc-1222a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:uc-2222a-t-us_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.4 OR cpe:2.3:h:moxa:uc-2222a-t-us:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:uc-2222a-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.4 OR cpe:2.3:h:moxa:uc-2222a-t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:uc-2222a-t-ap_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.4 OR cpe:2.3:h:moxa:uc-2222a-t-ap:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:uc-2222a-t-eu_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.4 OR cpe:2.3:h:moxa:uc-2222a-t-eu:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:uc-3434a-t-lte-wifi_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.2 OR cpe:2.3:h:moxa:uc-3434a-t-lte-wifi:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:uc-3424a-t-lte_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.2 OR cpe:2.3:h:moxa:uc-3424a-t-lte:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:uc-3420a-t-lte_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.2 OR cpe:2.3:h:moxa:uc-3420a-t-lte:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:uc-3430a-t-lte-wifi_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.2 OR cpe:2.3:h:moxa:uc-3430a-t-lte-wifi:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:uc-4450a-t-5g_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.3 OR cpe:2.3:h:moxa:uc-4450a-t-5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:uc-4434a-i-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.3 OR cpe:2.3:h:moxa:uc-4434a-i-t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:uc-4410a-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.3 OR cpe:2.3:h:moxa:uc-4410a-t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:uc-4454a-t-5g_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.3 OR cpe:2.3:h:moxa:uc-4454a-t-5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:uc-4414a-i-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.3 OR cpe:2.3:h:moxa:uc-4414a-i-t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:uc-4430a-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.3 OR cpe:2.3:h:moxa:uc-4430a-t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:uc-8210-t-lx-s_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.5 OR cpe:2.3:h:moxa:uc-8210-t-lx-s:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:uc-8220-t-lx-eu-s_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.5 OR cpe:2.3:h:moxa:uc-8220-t-lx-eu-s:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:uc-8220-t-lx-ap-s_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.5 OR cpe:2.3:h:moxa:uc-8220-t-lx-ap-s:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:uc-8220-t-lx-us-s_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.5 OR cpe:2.3:h:moxa:uc-8220-t-lx-us-s:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:uc-8220-t-lx_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.5 OR cpe:2.3:h:moxa:uc-8220-t-lx:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:v1202-ct-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.2.0 OR cpe:2.3:h:moxa:v1202-ct-t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:v1222-ct-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.2.0 OR cpe:2.3:h:moxa:v1222-ct-t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:v1222-w-ct-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.2.0 OR cpe:2.3:h:moxa:v1222-w-ct-t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:v2406c-kl7-ct-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.2 OR cpe:2.3:h:moxa:v2406c-kl7-ct-t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:v2406c-kl7-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.2 OR cpe:2.3:h:moxa:v2406c-kl7-t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:v2406c-wl7-ct-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.2 OR cpe:2.3:h:moxa:v2406c-wl7-ct-t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:v2406c-wl5-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.2 OR cpe:2.3:h:moxa:v2406c-wl5-t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:v2406c-kl1-ct-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.2 OR cpe:2.3:h:moxa:v2406c-kl1-ct-t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:v2406c-wl3-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.2 OR cpe:2.3:h:moxa:v2406c-wl3-t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:v2406c-wl1-ct-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.2 OR cpe:2.3:h:moxa:v2406c-wl1-ct-t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:v2406c-kl3-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.2 OR cpe:2.3:h:moxa:v2406c-kl3-t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:v2406c-wl1-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.2 OR cpe:2.3:h:moxa:v2406c-wl1-t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:v2406c-kl1-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.2 OR cpe:2.3:h:moxa:v2406c-kl1-t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:v2406c-wl7-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.2 OR cpe:2.3:h:moxa:v2406c-wl7-t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:v2406c-kl5-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.2 OR cpe:2.3:h:moxa:v2406c-kl5-t:-:*:*:*:*:*:*:*
    Added Reference Type Moxa Inc.: https://www.moxa.com/en/support/product-support/security-advisory/mpsa-255121-cve-2026-0714-cve-2026-0715-multiple-vulnerabilities-in-industrial-computers Types: Vendor Advisory
  • New CVE Received by [email protected]

    Feb. 05, 2026

    Action Type Old Value New Value
    Added Description A physical attack vulnerability exists in certain Moxa industrial computers using TPM-backed LUKS full-disk encryption on Moxa Industrial Linux 3, where the discrete TPM is connected to the CPU via an SPI bus. Exploitation requires invasive physical access, including opening the device and attaching external equipment to the SPI bus to capture TPM communications. If successful, the captured data may allow offline decryption of eMMC contents. This attack cannot be performed through brief or opportunistic physical access and requires extended physical access, possession of the device, appropriate equipment, and sufficient time for signal capture and analysis. Remote exploitation is not possible.
    Added CVSS V4.0 AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
    Added CWE CWE-319
    Added Reference https://www.moxa.com/en/support/product-support/security-advisory/mpsa-255121-cve-2026-0714-cve-2026-0715-multiple-vulnerabilities-in-industrial-computers
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
Base CVSS Score: 7
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability
Base CVSS Score: 6.8
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact