A physical attack vulnerability exists in certain Moxa industrial computers using TPM-backed LUKS full-disk encryption on Moxa Industrial Linux 3, where the discrete TPM is connected to the CPU via an SPI bus. Exploitation requires invasive physical access, including opening the device and attaching external equipment to the SPI bus to capture TPM communications. If successful, the captured data may allow offline decryption of eMMC contents. This attack cannot be performed through brief or opportunistic physical access and requires extended physical access, possession of the device, appropriate equipment, and sufficient time for signal capture and analysis. Remote exploitation is not possible.
History

Wed, 18 Feb 2026 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Moxa uc-1222a
Moxa uc-1222a Firmware
Moxa uc-2222a-t
Moxa uc-2222a-t-ap
Moxa uc-2222a-t-ap Firmware
Moxa uc-2222a-t-eu
Moxa uc-2222a-t-eu Firmware
Moxa uc-2222a-t-us
Moxa uc-2222a-t-us Firmware
Moxa uc-2222a-t Firmware
Moxa uc-3420a-t-lte
Moxa uc-3420a-t-lte Firmware
Moxa uc-3424a-t-lte
Moxa uc-3424a-t-lte Firmware
Moxa uc-3430a-t-lte-wifi
Moxa uc-3430a-t-lte-wifi Firmware
Moxa uc-3434a-t-lte-wifi
Moxa uc-3434a-t-lte-wifi Firmware
Moxa uc-4410a-t
Moxa uc-4410a-t Firmware
Moxa uc-4414a-i-t
Moxa uc-4414a-i-t Firmware
Moxa uc-4430a-t
Moxa uc-4430a-t Firmware
Moxa uc-4434a-i-t
Moxa uc-4434a-i-t Firmware
Moxa uc-4450a-t-5g
Moxa uc-4450a-t-5g Firmware
Moxa uc-4454a-t-5g
Moxa uc-4454a-t-5g Firmware
Moxa uc-8210-t-lx-s
Moxa uc-8210-t-lx-s Firmware
Moxa uc-8220-t-lx
Moxa uc-8220-t-lx-ap-s
Moxa uc-8220-t-lx-ap-s Firmware
Moxa uc-8220-t-lx-eu-s
Moxa uc-8220-t-lx-eu-s Firmware
Moxa uc-8220-t-lx-us-s
Moxa uc-8220-t-lx-us-s Firmware
Moxa uc-8220-t-lx Firmware
Moxa v1202-ct-t
Moxa v1202-ct-t Firmware
Moxa v1222-ct-t
Moxa v1222-ct-t Firmware
Moxa v1222-w-ct-t
Moxa v1222-w-ct-t Firmware
Moxa v2406c-kl1-ct-t
Moxa v2406c-kl1-ct-t Firmware
Moxa v2406c-kl1-t
Moxa v2406c-kl1-t Firmware
Moxa v2406c-kl3-t
Moxa v2406c-kl3-t Firmware
Moxa v2406c-kl5-t
Moxa v2406c-kl5-t Firmware
Moxa v2406c-kl7-ct-t
Moxa v2406c-kl7-ct-t Firmware
Moxa v2406c-kl7-t
Moxa v2406c-kl7-t Firmware
Moxa v2406c-wl1-ct-t
Moxa v2406c-wl1-ct-t Firmware
Moxa v2406c-wl1-t
Moxa v2406c-wl1-t Firmware
Moxa v2406c-wl3-t
Moxa v2406c-wl3-t Firmware
Moxa v2406c-wl5-t
Moxa v2406c-wl5-t Firmware
Moxa v2406c-wl7-ct-t
Moxa v2406c-wl7-ct-t Firmware
Moxa v2406c-wl7-t
Moxa v2406c-wl7-t Firmware
CPEs cpe:2.3:h:moxa:uc-1222a:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-2222a-t-ap:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-2222a-t-eu:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-2222a-t-us:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-2222a-t:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-3420a-t-lte:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-3424a-t-lte:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-3430a-t-lte-wifi:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-3434a-t-lte-wifi:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-4410a-t:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-4414a-i-t:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-4430a-t:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-4434a-i-t:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-4450a-t-5g:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-4454a-t-5g:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-8210-t-lx-s:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-8220-t-lx-ap-s:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-8220-t-lx-eu-s:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-8220-t-lx-us-s:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:uc-8220-t-lx:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:v1202-ct-t:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:v1222-ct-t:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:v1222-w-ct-t:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:v2406c-kl1-ct-t:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:v2406c-kl1-t:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:v2406c-kl3-t:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:v2406c-kl5-t:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:v2406c-kl7-ct-t:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:v2406c-kl7-t:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:v2406c-wl1-ct-t:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:v2406c-wl1-t:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:v2406c-wl3-t:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:v2406c-wl5-t:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:v2406c-wl7-ct-t:-:*:*:*:*:*:*:*
cpe:2.3:h:moxa:v2406c-wl7-t:-:*:*:*:*:*:*:*
cpe:2.3:o:moxa:uc-1222a_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:moxa:uc-2222a-t-ap_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:moxa:uc-2222a-t-eu_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:moxa:uc-2222a-t-us_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:moxa:uc-2222a-t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:moxa:uc-3420a-t-lte_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:moxa:uc-3424a-t-lte_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:moxa:uc-3430a-t-lte-wifi_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:moxa:uc-3434a-t-lte-wifi_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:moxa:uc-4410a-t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:moxa:uc-4414a-i-t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:moxa:uc-4430a-t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:moxa:uc-4434a-i-t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:moxa:uc-4450a-t-5g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:moxa:uc-4454a-t-5g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:moxa:uc-8210-t-lx-s_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:moxa:uc-8220-t-lx-ap-s_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:moxa:uc-8220-t-lx-eu-s_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:moxa:uc-8220-t-lx-us-s_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:moxa:uc-8220-t-lx_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:moxa:v1202-ct-t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:moxa:v1222-ct-t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:moxa:v1222-w-ct-t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:moxa:v2406c-kl1-ct-t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:moxa:v2406c-kl1-t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:moxa:v2406c-kl3-t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:moxa:v2406c-kl5-t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:moxa:v2406c-kl7-ct-t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:moxa:v2406c-kl7-t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:moxa:v2406c-wl1-ct-t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:moxa:v2406c-wl1-t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:moxa:v2406c-wl3-t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:moxa:v2406c-wl5-t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:moxa:v2406c-wl7-ct-t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:moxa:v2406c-wl7-t_firmware:*:*:*:*:*:*:*:*
Vendors & Products Moxa uc-1222a
Moxa uc-1222a Firmware
Moxa uc-2222a-t
Moxa uc-2222a-t-ap
Moxa uc-2222a-t-ap Firmware
Moxa uc-2222a-t-eu
Moxa uc-2222a-t-eu Firmware
Moxa uc-2222a-t-us
Moxa uc-2222a-t-us Firmware
Moxa uc-2222a-t Firmware
Moxa uc-3420a-t-lte
Moxa uc-3420a-t-lte Firmware
Moxa uc-3424a-t-lte
Moxa uc-3424a-t-lte Firmware
Moxa uc-3430a-t-lte-wifi
Moxa uc-3430a-t-lte-wifi Firmware
Moxa uc-3434a-t-lte-wifi
Moxa uc-3434a-t-lte-wifi Firmware
Moxa uc-4410a-t
Moxa uc-4410a-t Firmware
Moxa uc-4414a-i-t
Moxa uc-4414a-i-t Firmware
Moxa uc-4430a-t
Moxa uc-4430a-t Firmware
Moxa uc-4434a-i-t
Moxa uc-4434a-i-t Firmware
Moxa uc-4450a-t-5g
Moxa uc-4450a-t-5g Firmware
Moxa uc-4454a-t-5g
Moxa uc-4454a-t-5g Firmware
Moxa uc-8210-t-lx-s
Moxa uc-8210-t-lx-s Firmware
Moxa uc-8220-t-lx
Moxa uc-8220-t-lx-ap-s
Moxa uc-8220-t-lx-ap-s Firmware
Moxa uc-8220-t-lx-eu-s
Moxa uc-8220-t-lx-eu-s Firmware
Moxa uc-8220-t-lx-us-s
Moxa uc-8220-t-lx-us-s Firmware
Moxa uc-8220-t-lx Firmware
Moxa v1202-ct-t
Moxa v1202-ct-t Firmware
Moxa v1222-ct-t
Moxa v1222-ct-t Firmware
Moxa v1222-w-ct-t
Moxa v1222-w-ct-t Firmware
Moxa v2406c-kl1-ct-t
Moxa v2406c-kl1-ct-t Firmware
Moxa v2406c-kl1-t
Moxa v2406c-kl1-t Firmware
Moxa v2406c-kl3-t
Moxa v2406c-kl3-t Firmware
Moxa v2406c-kl5-t
Moxa v2406c-kl5-t Firmware
Moxa v2406c-kl7-ct-t
Moxa v2406c-kl7-ct-t Firmware
Moxa v2406c-kl7-t
Moxa v2406c-kl7-t Firmware
Moxa v2406c-wl1-ct-t
Moxa v2406c-wl1-ct-t Firmware
Moxa v2406c-wl1-t
Moxa v2406c-wl1-t Firmware
Moxa v2406c-wl3-t
Moxa v2406c-wl3-t Firmware
Moxa v2406c-wl5-t
Moxa v2406c-wl5-t Firmware
Moxa v2406c-wl7-ct-t
Moxa v2406c-wl7-ct-t Firmware
Moxa v2406c-wl7-t
Moxa v2406c-wl7-t Firmware
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Fri, 06 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Moxa
Moxa uc-1200a Series
Vendors & Products Moxa
Moxa uc-1200a Series

Thu, 05 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 05 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Description A physical attack vulnerability exists in certain Moxa industrial computers using TPM-backed LUKS full-disk encryption on Moxa Industrial Linux 3, where the discrete TPM is connected to the CPU via an SPI bus. Exploitation requires invasive physical access, including opening the device and attaching external equipment to the SPI bus to capture TPM communications. If successful, the captured data may allow offline decryption of eMMC contents. This attack cannot be performed through brief or opportunistic physical access and requires extended physical access, possession of the device, appropriate equipment, and sufficient time for signal capture and analysis. Remote exploitation is not possible.
Weaknesses CWE-319
References
Metrics cvssV4_0

{'score': 7, 'vector': 'CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Moxa

Published: 2026-02-05T16:58:50.181Z

Updated: 2026-02-05T17:28:18.287Z

Reserved: 2026-01-08T10:25:22.303Z

Link: CVE-2026-0714

cve-icon Vulnrichment

Updated: 2026-02-05T17:28:12.070Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-05T17:16:13.203

Modified: 2026-02-18T17:55:46.557

Link: CVE-2026-0714

cve-icon Redhat

No data.