7.0
HIGH CVSS 4.0
CVE-2026-0715
Moxa Arm-based Industrial Computers Bootloader Access Vulnerability
Description

Moxa Arm-based industrial computers running Moxa Industrial Linux Secure use a device-unique bootloader password provided on the device. An attacker with physical access to the device could use this information to access the bootloader menu via a serial interface.  Access to the bootloader menu does not allow full system takeover or privilege escalation. The bootloader enforces digital signature verification and only permits flashing of Moxa-signed images. As a result, an attacker cannot install malicious firmware or execute arbitrary code. The primary impact is limited to a potential temporary denial-of-service condition if a valid image is reflashed. Remote exploitation is not possible.

INFO

Published Date :

Feb. 5, 2026, 5:16 p.m.

Last Modified :

Feb. 18, 2026, 5:51 p.m.

Remotely Exploit :

No
Affected Products

The following products are affected by CVE-2026-0715 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Moxa uc-8210-t-lx-s_firmware
2 Moxa uc-8220-t-lx_firmware
3 Moxa uc-8220-t-lx-ap-s_firmware
4 Moxa uc-8220-t-lx-eu-s_firmware
5 Moxa uc-8220-t-lx-us-s_firmware
6 Moxa uc-8220-t-lx
7 Moxa uc-8220-t-lx-us-s
8 Moxa uc-8220-t-lx-eu-s
9 Moxa uc-8220-t-lx-ap-s
10 Moxa uc-8210-t-lx-s
11 Moxa uc-1222a_firmware
12 Moxa uc-1222a
13 Moxa uc-2222a-t-us_firmware
14 Moxa uc-2222a-t-us
15 Moxa uc-2222a-t_firmware
16 Moxa uc-2222a-t
17 Moxa uc-2222a-t-ap_firmware
18 Moxa uc-2222a-t-ap
19 Moxa uc-2222a-t-eu_firmware
20 Moxa uc-2222a-t-eu
21 Moxa uc-3434a-t-lte-wifi_firmware
22 Moxa uc-3434a-t-lte-wifi
23 Moxa uc-3424a-t-lte_firmware
24 Moxa uc-3424a-t-lte
25 Moxa uc-3420a-t-lte_firmware
26 Moxa uc-3420a-t-lte
27 Moxa uc-3430a-t-lte-wifi_firmware
28 Moxa uc-3430a-t-lte-wifi
29 Moxa uc-4450a-t-5g_firmware
30 Moxa uc-4450a-t-5g
31 Moxa uc-4434a-i-t_firmware
32 Moxa uc-4434a-i-t
33 Moxa uc-4410a-t_firmware
34 Moxa uc-4410a-t
35 Moxa uc-4454a-t-5g_firmware
36 Moxa uc-4454a-t-5g
37 Moxa uc-4414a-i-t_firmware
38 Moxa uc-4414a-i-t
39 Moxa uc-4430a-t_firmware
40 Moxa uc-4430a-t
41 Moxa v1202-ct-t_firmware
42 Moxa v1202-ct-t
43 Moxa v1222-ct-t_firmware
44 Moxa v1222-ct-t
45 Moxa v1222-w-ct-t_firmware
46 Moxa v1222-w-ct-t
47 Moxa v2406c-kl7-ct-t_firmware
48 Moxa v2406c-kl7-ct-t
49 Moxa v2406c-kl7-t_firmware
50 Moxa v2406c-kl7-t
51 Moxa v2406c-wl7-ct-t_firmware
52 Moxa v2406c-wl7-ct-t
53 Moxa v2406c-wl5-t_firmware
54 Moxa v2406c-wl5-t
55 Moxa v2406c-kl1-ct-t_firmware
56 Moxa v2406c-kl1-ct-t
57 Moxa v2406c-wl3-t_firmware
58 Moxa v2406c-wl3-t
59 Moxa v2406c-wl1-ct-t_firmware
60 Moxa v2406c-wl1-ct-t
61 Moxa v2406c-kl3-t_firmware
62 Moxa v2406c-kl3-t
63 Moxa v2406c-wl1-t_firmware
64 Moxa v2406c-wl1-t
65 Moxa v2406c-kl1-t_firmware
66 Moxa v2406c-kl1-t
67 Moxa v2406c-wl7-t_firmware
68 Moxa v2406c-wl7-t
69 Moxa v2406c-kl5-t_firmware
70 Moxa v2406c-kl5-t
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 MEDIUM [email protected]
CVSS 4.0 HIGH 2e0a0ee2-d866-482a-9f5e-ac03d156dbaa
CVSS 4.0 HIGH [email protected]
Solution
Secure bootloader access and prevent unauthorized menu access.
  • Protect physical access to the device.
  • Review bootloader configuration settings.
  • Implement strong passwords for sensitive access.
  • Monitor for unauthorized physical access attempts.
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2026-0715.

URL Resource
https://www.moxa.com/en/support/product-support/security-advisory/mpsa-255121-cve-2026-0714-cve-2026-0715-multiple-vulnerabilities-in-industrial-computers Vendor Advisory
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2026-0715 is associated with the following CWEs:

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2026-0715 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2026-0715 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Initial Analysis by [email protected]

    Feb. 18, 2026

    Action Type Old Value New Value
    Added CVSS V3.1 AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:uc-1222a_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.4 OR cpe:2.3:h:moxa:uc-1222a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:uc-2222a-t-us_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.4 OR cpe:2.3:h:moxa:uc-2222a-t-us:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:uc-2222a-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.4 OR cpe:2.3:h:moxa:uc-2222a-t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:uc-2222a-t-ap_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.4 OR cpe:2.3:h:moxa:uc-2222a-t-ap:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:uc-2222a-t-eu_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.4 OR cpe:2.3:h:moxa:uc-2222a-t-eu:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:uc-3434a-t-lte-wifi_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.2 OR cpe:2.3:h:moxa:uc-3434a-t-lte-wifi:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:uc-3424a-t-lte_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.2 OR cpe:2.3:h:moxa:uc-3424a-t-lte:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:uc-3420a-t-lte_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.2 OR cpe:2.3:h:moxa:uc-3420a-t-lte:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:uc-3430a-t-lte-wifi_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.2 OR cpe:2.3:h:moxa:uc-3430a-t-lte-wifi:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:uc-4450a-t-5g_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.3 OR cpe:2.3:h:moxa:uc-4450a-t-5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:uc-4434a-i-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.3 OR cpe:2.3:h:moxa:uc-4434a-i-t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:uc-4410a-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.3 OR cpe:2.3:h:moxa:uc-4410a-t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:uc-4454a-t-5g_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.3 OR cpe:2.3:h:moxa:uc-4454a-t-5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:uc-4414a-i-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.3 OR cpe:2.3:h:moxa:uc-4414a-i-t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:uc-4430a-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.3 OR cpe:2.3:h:moxa:uc-4430a-t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:uc-8210-t-lx-s_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.5 OR cpe:2.3:h:moxa:uc-8210-t-lx-s:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:uc-8220-t-lx-eu-s_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.5 OR cpe:2.3:h:moxa:uc-8220-t-lx-eu-s:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:uc-8220-t-lx-ap-s_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.5 OR cpe:2.3:h:moxa:uc-8220-t-lx-ap-s:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:uc-8220-t-lx-us-s_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.5 OR cpe:2.3:h:moxa:uc-8220-t-lx-us-s:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:uc-8220-t-lx_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.5 OR cpe:2.3:h:moxa:uc-8220-t-lx:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:v1202-ct-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.2.0 OR cpe:2.3:h:moxa:v1202-ct-t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:v1222-ct-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.2.0 OR cpe:2.3:h:moxa:v1222-ct-t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:v1222-w-ct-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.2.0 OR cpe:2.3:h:moxa:v1222-w-ct-t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:v2406c-kl7-ct-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.2 OR cpe:2.3:h:moxa:v2406c-kl7-ct-t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:v2406c-kl7-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.2 OR cpe:2.3:h:moxa:v2406c-kl7-t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:v2406c-wl7-ct-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.2 OR cpe:2.3:h:moxa:v2406c-wl7-ct-t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:v2406c-wl5-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.2 OR cpe:2.3:h:moxa:v2406c-wl5-t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:v2406c-kl1-ct-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.2 OR cpe:2.3:h:moxa:v2406c-kl1-ct-t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:v2406c-wl3-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.2 OR cpe:2.3:h:moxa:v2406c-wl3-t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:v2406c-wl1-ct-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.2 OR cpe:2.3:h:moxa:v2406c-wl1-ct-t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:v2406c-kl3-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.2 OR cpe:2.3:h:moxa:v2406c-kl3-t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:v2406c-wl1-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.2 OR cpe:2.3:h:moxa:v2406c-wl1-t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:v2406c-kl1-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.2 OR cpe:2.3:h:moxa:v2406c-kl1-t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:v2406c-wl7-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.2 OR cpe:2.3:h:moxa:v2406c-wl7-t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:moxa:v2406c-kl5-t_firmware:*:*:*:*:*:*:*:* versions up to (including) 1.2 OR cpe:2.3:h:moxa:v2406c-kl5-t:-:*:*:*:*:*:*:*
    Added Reference Type Moxa Inc.: https://www.moxa.com/en/support/product-support/security-advisory/mpsa-255121-cve-2026-0714-cve-2026-0715-multiple-vulnerabilities-in-industrial-computers Types: Vendor Advisory
  • New CVE Received by [email protected]

    Feb. 05, 2026

    Action Type Old Value New Value
    Added Description Moxa Arm-based industrial computers running Moxa Industrial Linux Secure use a device-unique bootloader password provided on the device. An attacker with physical access to the device could use this information to access the bootloader menu via a serial interface.  Access to the bootloader menu does not allow full system takeover or privilege escalation. The bootloader enforces digital signature verification and only permits flashing of Moxa-signed images. As a result, an attacker cannot install malicious firmware or execute arbitrary code. The primary impact is limited to a potential temporary denial-of-service condition if a valid image is reflashed. Remote exploitation is not possible.
    Added CVSS V4.0 AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
    Added CWE CWE-522
    Added Reference https://www.moxa.com/en/support/product-support/security-advisory/mpsa-255121-cve-2026-0714-cve-2026-0715-multiple-vulnerabilities-in-industrial-computers
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
Base CVSS Score: 7
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability
Base CVSS Score: 6.8
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact