A physical attack vulnerability exists in certain Moxa industrial computers using TPM-backed LUKS full-disk encryption on Moxa Industrial Linux 3, where the discrete TPM is connected to the CPU via an SPI bus. Exploitation requires invasive physical access, including opening the device and attaching external equipment to the SPI bus to capture TPM communications. If successful, the captured data may allow offline decryption of eMMC contents. This attack cannot be performed through brief or opportunistic physical access and requires extended physical access, possession of the device, appropriate equipment, and sufficient time for signal capture and analysis. Remote exploitation is not possible.
Metrics
Affected Vendors & Products
References
History
Wed, 18 Feb 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Moxa uc-1222a
Moxa uc-1222a Firmware Moxa uc-2222a-t Moxa uc-2222a-t-ap Moxa uc-2222a-t-ap Firmware Moxa uc-2222a-t-eu Moxa uc-2222a-t-eu Firmware Moxa uc-2222a-t-us Moxa uc-2222a-t-us Firmware Moxa uc-2222a-t Firmware Moxa uc-3420a-t-lte Moxa uc-3420a-t-lte Firmware Moxa uc-3424a-t-lte Moxa uc-3424a-t-lte Firmware Moxa uc-3430a-t-lte-wifi Moxa uc-3430a-t-lte-wifi Firmware Moxa uc-3434a-t-lte-wifi Moxa uc-3434a-t-lte-wifi Firmware Moxa uc-4410a-t Moxa uc-4410a-t Firmware Moxa uc-4414a-i-t Moxa uc-4414a-i-t Firmware Moxa uc-4430a-t Moxa uc-4430a-t Firmware Moxa uc-4434a-i-t Moxa uc-4434a-i-t Firmware Moxa uc-4450a-t-5g Moxa uc-4450a-t-5g Firmware Moxa uc-4454a-t-5g Moxa uc-4454a-t-5g Firmware Moxa uc-8210-t-lx-s Moxa uc-8210-t-lx-s Firmware Moxa uc-8220-t-lx Moxa uc-8220-t-lx-ap-s Moxa uc-8220-t-lx-ap-s Firmware Moxa uc-8220-t-lx-eu-s Moxa uc-8220-t-lx-eu-s Firmware Moxa uc-8220-t-lx-us-s Moxa uc-8220-t-lx-us-s Firmware Moxa uc-8220-t-lx Firmware Moxa v1202-ct-t Moxa v1202-ct-t Firmware Moxa v1222-ct-t Moxa v1222-ct-t Firmware Moxa v1222-w-ct-t Moxa v1222-w-ct-t Firmware Moxa v2406c-kl1-ct-t Moxa v2406c-kl1-ct-t Firmware Moxa v2406c-kl1-t Moxa v2406c-kl1-t Firmware Moxa v2406c-kl3-t Moxa v2406c-kl3-t Firmware Moxa v2406c-kl5-t Moxa v2406c-kl5-t Firmware Moxa v2406c-kl7-ct-t Moxa v2406c-kl7-ct-t Firmware Moxa v2406c-kl7-t Moxa v2406c-kl7-t Firmware Moxa v2406c-wl1-ct-t Moxa v2406c-wl1-ct-t Firmware Moxa v2406c-wl1-t Moxa v2406c-wl1-t Firmware Moxa v2406c-wl3-t Moxa v2406c-wl3-t Firmware Moxa v2406c-wl5-t Moxa v2406c-wl5-t Firmware Moxa v2406c-wl7-ct-t Moxa v2406c-wl7-ct-t Firmware Moxa v2406c-wl7-t Moxa v2406c-wl7-t Firmware |
|
| CPEs | cpe:2.3:h:moxa:uc-1222a:-:*:*:*:*:*:*:* cpe:2.3:h:moxa:uc-2222a-t-ap:-:*:*:*:*:*:*:* cpe:2.3:h:moxa:uc-2222a-t-eu:-:*:*:*:*:*:*:* cpe:2.3:h:moxa:uc-2222a-t-us:-:*:*:*:*:*:*:* cpe:2.3:h:moxa:uc-2222a-t:-:*:*:*:*:*:*:* cpe:2.3:h:moxa:uc-3420a-t-lte:-:*:*:*:*:*:*:* cpe:2.3:h:moxa:uc-3424a-t-lte:-:*:*:*:*:*:*:* cpe:2.3:h:moxa:uc-3430a-t-lte-wifi:-:*:*:*:*:*:*:* cpe:2.3:h:moxa:uc-3434a-t-lte-wifi:-:*:*:*:*:*:*:* cpe:2.3:h:moxa:uc-4410a-t:-:*:*:*:*:*:*:* cpe:2.3:h:moxa:uc-4414a-i-t:-:*:*:*:*:*:*:* cpe:2.3:h:moxa:uc-4430a-t:-:*:*:*:*:*:*:* cpe:2.3:h:moxa:uc-4434a-i-t:-:*:*:*:*:*:*:* cpe:2.3:h:moxa:uc-4450a-t-5g:-:*:*:*:*:*:*:* cpe:2.3:h:moxa:uc-4454a-t-5g:-:*:*:*:*:*:*:* cpe:2.3:h:moxa:uc-8210-t-lx-s:-:*:*:*:*:*:*:* cpe:2.3:h:moxa:uc-8220-t-lx-ap-s:-:*:*:*:*:*:*:* cpe:2.3:h:moxa:uc-8220-t-lx-eu-s:-:*:*:*:*:*:*:* cpe:2.3:h:moxa:uc-8220-t-lx-us-s:-:*:*:*:*:*:*:* cpe:2.3:h:moxa:uc-8220-t-lx:-:*:*:*:*:*:*:* cpe:2.3:h:moxa:v1202-ct-t:-:*:*:*:*:*:*:* cpe:2.3:h:moxa:v1222-ct-t:-:*:*:*:*:*:*:* cpe:2.3:h:moxa:v1222-w-ct-t:-:*:*:*:*:*:*:* cpe:2.3:h:moxa:v2406c-kl1-ct-t:-:*:*:*:*:*:*:* cpe:2.3:h:moxa:v2406c-kl1-t:-:*:*:*:*:*:*:* cpe:2.3:h:moxa:v2406c-kl3-t:-:*:*:*:*:*:*:* cpe:2.3:h:moxa:v2406c-kl5-t:-:*:*:*:*:*:*:* cpe:2.3:h:moxa:v2406c-kl7-ct-t:-:*:*:*:*:*:*:* cpe:2.3:h:moxa:v2406c-kl7-t:-:*:*:*:*:*:*:* cpe:2.3:h:moxa:v2406c-wl1-ct-t:-:*:*:*:*:*:*:* cpe:2.3:h:moxa:v2406c-wl1-t:-:*:*:*:*:*:*:* cpe:2.3:h:moxa:v2406c-wl3-t:-:*:*:*:*:*:*:* cpe:2.3:h:moxa:v2406c-wl5-t:-:*:*:*:*:*:*:* cpe:2.3:h:moxa:v2406c-wl7-ct-t:-:*:*:*:*:*:*:* cpe:2.3:h:moxa:v2406c-wl7-t:-:*:*:*:*:*:*:* cpe:2.3:o:moxa:uc-1222a_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:moxa:uc-2222a-t-ap_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:moxa:uc-2222a-t-eu_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:moxa:uc-2222a-t-us_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:moxa:uc-2222a-t_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:moxa:uc-3420a-t-lte_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:moxa:uc-3424a-t-lte_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:moxa:uc-3430a-t-lte-wifi_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:moxa:uc-3434a-t-lte-wifi_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:moxa:uc-4410a-t_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:moxa:uc-4414a-i-t_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:moxa:uc-4430a-t_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:moxa:uc-4434a-i-t_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:moxa:uc-4450a-t-5g_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:moxa:uc-4454a-t-5g_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:moxa:uc-8210-t-lx-s_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:moxa:uc-8220-t-lx-ap-s_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:moxa:uc-8220-t-lx-eu-s_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:moxa:uc-8220-t-lx-us-s_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:moxa:uc-8220-t-lx_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:moxa:v1202-ct-t_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:moxa:v1222-ct-t_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:moxa:v1222-w-ct-t_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:moxa:v2406c-kl1-ct-t_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:moxa:v2406c-kl1-t_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:moxa:v2406c-kl3-t_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:moxa:v2406c-kl5-t_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:moxa:v2406c-kl7-ct-t_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:moxa:v2406c-kl7-t_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:moxa:v2406c-wl1-ct-t_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:moxa:v2406c-wl1-t_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:moxa:v2406c-wl3-t_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:moxa:v2406c-wl5-t_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:moxa:v2406c-wl7-ct-t_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:moxa:v2406c-wl7-t_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Moxa uc-1222a
Moxa uc-1222a Firmware Moxa uc-2222a-t Moxa uc-2222a-t-ap Moxa uc-2222a-t-ap Firmware Moxa uc-2222a-t-eu Moxa uc-2222a-t-eu Firmware Moxa uc-2222a-t-us Moxa uc-2222a-t-us Firmware Moxa uc-2222a-t Firmware Moxa uc-3420a-t-lte Moxa uc-3420a-t-lte Firmware Moxa uc-3424a-t-lte Moxa uc-3424a-t-lte Firmware Moxa uc-3430a-t-lte-wifi Moxa uc-3430a-t-lte-wifi Firmware Moxa uc-3434a-t-lte-wifi Moxa uc-3434a-t-lte-wifi Firmware Moxa uc-4410a-t Moxa uc-4410a-t Firmware Moxa uc-4414a-i-t Moxa uc-4414a-i-t Firmware Moxa uc-4430a-t Moxa uc-4430a-t Firmware Moxa uc-4434a-i-t Moxa uc-4434a-i-t Firmware Moxa uc-4450a-t-5g Moxa uc-4450a-t-5g Firmware Moxa uc-4454a-t-5g Moxa uc-4454a-t-5g Firmware Moxa uc-8210-t-lx-s Moxa uc-8210-t-lx-s Firmware Moxa uc-8220-t-lx Moxa uc-8220-t-lx-ap-s Moxa uc-8220-t-lx-ap-s Firmware Moxa uc-8220-t-lx-eu-s Moxa uc-8220-t-lx-eu-s Firmware Moxa uc-8220-t-lx-us-s Moxa uc-8220-t-lx-us-s Firmware Moxa uc-8220-t-lx Firmware Moxa v1202-ct-t Moxa v1202-ct-t Firmware Moxa v1222-ct-t Moxa v1222-ct-t Firmware Moxa v1222-w-ct-t Moxa v1222-w-ct-t Firmware Moxa v2406c-kl1-ct-t Moxa v2406c-kl1-ct-t Firmware Moxa v2406c-kl1-t Moxa v2406c-kl1-t Firmware Moxa v2406c-kl3-t Moxa v2406c-kl3-t Firmware Moxa v2406c-kl5-t Moxa v2406c-kl5-t Firmware Moxa v2406c-kl7-ct-t Moxa v2406c-kl7-ct-t Firmware Moxa v2406c-kl7-t Moxa v2406c-kl7-t Firmware Moxa v2406c-wl1-ct-t Moxa v2406c-wl1-ct-t Firmware Moxa v2406c-wl1-t Moxa v2406c-wl1-t Firmware Moxa v2406c-wl3-t Moxa v2406c-wl3-t Firmware Moxa v2406c-wl5-t Moxa v2406c-wl5-t Firmware Moxa v2406c-wl7-ct-t Moxa v2406c-wl7-ct-t Firmware Moxa v2406c-wl7-t Moxa v2406c-wl7-t Firmware |
|
| Metrics |
cvssV3_1
|
Fri, 06 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Moxa
Moxa uc-1200a Series |
|
| Vendors & Products |
Moxa
Moxa uc-1200a Series |
Thu, 05 Feb 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 05 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A physical attack vulnerability exists in certain Moxa industrial computers using TPM-backed LUKS full-disk encryption on Moxa Industrial Linux 3, where the discrete TPM is connected to the CPU via an SPI bus. Exploitation requires invasive physical access, including opening the device and attaching external equipment to the SPI bus to capture TPM communications. If successful, the captured data may allow offline decryption of eMMC contents. This attack cannot be performed through brief or opportunistic physical access and requires extended physical access, possession of the device, appropriate equipment, and sufficient time for signal capture and analysis. Remote exploitation is not possible. | |
| Weaknesses | CWE-319 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Moxa
Published: 2026-02-05T16:58:50.181Z
Updated: 2026-02-05T17:28:18.287Z
Reserved: 2026-01-08T10:25:22.303Z
Link: CVE-2026-0714
Updated: 2026-02-05T17:28:12.070Z
Status : Analyzed
Published: 2026-02-05T17:16:13.203
Modified: 2026-02-18T17:55:46.557
Link: CVE-2026-0714
No data.