Moxa CVE-2026-0714, CVE-2026-0715: Multiple Vulnerabilities in Industrial Computers
CVE-2026-0714: A physical vulnerability in Moxa industrial computers using TPM-backed LUKS full-disk encryption on Moxa Industrial Linux 3. An attacker with invasive physical access could attach equipment to the SPI bus to capture TPM communications and potentially decrypt the disk offline. This requires opening the device, possessing appropriate probe equipment, and extended access time for signal capture and analysis.\n\nCVE-2026-0715: Moxa Arm-based industrial computers running Moxa Industrial Linux Secure use a device-unique bootloader password printed on the device. An attacker with physical access to the serial console could enter bootloader mode. However, bootloader signature verification prevents installation of unsigned firmware, limiting the impact to temporary denial of service if a valid image is reflashed.
- Physical access to open the device enclosure
- For CVE-2026-0714: SPI bus probe equipment and signal capture capability
- For CVE-2026-0714: Extended device possession time for signal analysis
- For CVE-2026-0715: Physical access to serial console port
- For CVE-2026-0715: Knowledge of device-unique bootloader password (printed on device)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/87706433-a277-4845-8b01-18be4f24d580