TROYANOSYVIRUS
Voltar para CVEs

CVE-2026-0714

MEDIUM
6.8

Descricao

A physical attack vulnerability exists in certain Moxa industrial computers using TPM-backed LUKS full-disk encryption on Moxa Industrial Linux 3, where the discrete TPM is connected to the CPU via an SPI bus. Exploitation requires invasive physical access, including opening the device and attaching external equipment to the SPI bus to capture TPM communications. If successful, the captured data may allow offline decryption of eMMC contents. This attack cannot be performed through brief or opportunistic physical access and requires extended physical access, possession of the device, appropriate equipment, and sufficient time for signal capture and analysis. Remote exploitation is not possible.

Detalhes CVE

Pontuacao CVSS v3.16.8
SeveridadeMEDIUM
Vetor CVSSCVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vetor de ataquePHYSICAL
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado2/5/2026
Ultima modificacao2/18/2026
Fontenvd
Avistamentos honeypot0

Produtos afetados

moxa:uc-1222amoxa:uc-1222a_firmwaremoxa:uc-2222a-tmoxa:uc-2222a-t-apmoxa:uc-2222a-t-ap_firmwaremoxa:uc-2222a-t-eumoxa:uc-2222a-t-eu_firmwaremoxa:uc-2222a-t-usmoxa:uc-2222a-t-us_firmwaremoxa:uc-2222a-t_firmwaremoxa:uc-3420a-t-ltemoxa:uc-3420a-t-lte_firmwaremoxa:uc-3424a-t-ltemoxa:uc-3424a-t-lte_firmwaremoxa:uc-3430a-t-lte-wifimoxa:uc-3430a-t-lte-wifi_firmwaremoxa:uc-3434a-t-lte-wifimoxa:uc-3434a-t-lte-wifi_firmwaremoxa:uc-4410a-tmoxa:uc-4410a-t_firmwaremoxa:uc-4414a-i-tmoxa:uc-4414a-i-t_firmwaremoxa:uc-4430a-tmoxa:uc-4430a-t_firmwaremoxa:uc-4434a-i-tmoxa:uc-4434a-i-t_firmwaremoxa:uc-4450a-t-5gmoxa:uc-4450a-t-5g_firmwaremoxa:uc-4454a-t-5gmoxa:uc-4454a-t-5g_firmwaremoxa:uc-8210-t-lx-smoxa:uc-8210-t-lx-s_firmwaremoxa:uc-8220-t-lxmoxa:uc-8220-t-lx-ap-smoxa:uc-8220-t-lx-ap-s_firmwaremoxa:uc-8220-t-lx-eu-smoxa:uc-8220-t-lx-eu-s_firmwaremoxa:uc-8220-t-lx-us-smoxa:uc-8220-t-lx-us-s_firmwaremoxa:uc-8220-t-lx_firmwaremoxa:v1202-ct-tmoxa:v1202-ct-t_firmwaremoxa:v1222-ct-tmoxa:v1222-ct-t_firmwaremoxa:v1222-w-ct-tmoxa:v1222-w-ct-t_firmwaremoxa:v2406c-kl1-ct-tmoxa:v2406c-kl1-ct-t_firmwaremoxa:v2406c-kl1-tmoxa:v2406c-kl1-t_firmwaremoxa:v2406c-kl3-tmoxa:v2406c-kl3-t_firmwaremoxa:v2406c-kl5-tmoxa:v2406c-kl5-t_firmwaremoxa:v2406c-kl7-ct-tmoxa:v2406c-kl7-ct-t_firmwaremoxa:v2406c-kl7-tmoxa:v2406c-kl7-t_firmwaremoxa:v2406c-wl1-ct-tmoxa:v2406c-wl1-ct-t_firmwaremoxa:v2406c-wl1-tmoxa:v2406c-wl1-t_firmwaremoxa:v2406c-wl3-tmoxa:v2406c-wl3-t_firmwaremoxa:v2406c-wl5-tmoxa:v2406c-wl5-t_firmwaremoxa:v2406c-wl7-ct-tmoxa:v2406c-wl7-ct-t_firmwaremoxa:v2406c-wl7-tmoxa:v2406c-wl7-t_firmware

Fraquezas (CWE)

CWE-319

Correlacoes IOC

Sem correlacoes registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.