Moxa CVE-2026-0714, CVE-2026-0715: Multiple Vulnerabilities in Industrial Computers
Two vulnerabilities in Moxa industrial computers: CVE-2026-0714 is a physical attack on TPM-backed LUKS full-disk encryption where an attacker with device disassembly capability and SPI bus interception equipment can capture TPM communications to potentially decrypt the eMMC storage offline. This requires invasive access, specialized equipment, extended time, and cannot be performed remotely. CVE-2026-0715 involves a device-unique bootloader password provided on the device that allows physical access via serial interface to enter the bootloader menu, but firmware signature verification prevents malicious code execution; the only impact is potential temporary denial-of-service if a valid image is reflashed. Both vulnerabilities require physical access and are not remotely exploitable.
- CVE-2026-0714: Invasive physical access, device disassembly capability, specialized SPI bus sniffing equipment, extended time to capture TPM communications, and knowledge of TPM-LUKS encryption mechanisms
- CVE-2026-0715: Physical access to the device, ability to locate and read the bootloader password printed on the device, access to a serial console interface, and knowledge of Moxa bootloader menu navigation
Patching may require device reboot — plan for process interruption
/api/v1/advisories/87706433-a277-4845-8b01-18be4f24d580Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.