V1222 Ct T Firmware

2 CVEs product

Monthly

CVE-2026-0715 MEDIUM This Month

Bootloader menu access in Moxa UC series industrial computers can be obtained by attackers with physical access using a device-unique password, potentially enabling temporary denial-of-service through firmware reflashing. The vulnerability is constrained by bootloader signature verification that prevents installation of unsigned firmware or arbitrary code execution. No patch is currently available for affected Linux and UC firmware versions.

Linux Privilege Escalation V1202 Ct T Firmware Uc 3424a T Lte Firmware V2406c Wl1 Ct T Firmware +32
NVD
CVSS 3.1
6.8
EPSS
0.0%
CVE-2026-0714 MEDIUM This Month

TPM-backed LUKS encryption bypass in Moxa Industrial Linux 3 on select industrial computers allows an attacker with invasive physical access to the SPI bus to intercept TPM communications and decrypt eMMC storage contents offline. This attack requires opening the device and connecting specialized equipment for extended signal capture, making it impractical for opportunistic access scenarios. Affected products include V1222 Ct T, Uc 3430a T Lte Wifi, Uc 8220 T Lx, and Uc 4414a I T firmware variants.

Linux V1222 Ct T Firmware Uc 3430a T Lte Wifi Firmware Uc 8220 T Lx Firmware Uc 4414a I T Firmware +31
NVD
CVSS 3.1
6.8
EPSS
0.0%
CVE-2026-0715
EPSS 0% CVSS 6.8
MEDIUM This Month

Bootloader menu access in Moxa UC series industrial computers can be obtained by attackers with physical access using a device-unique password, potentially enabling temporary denial-of-service through firmware reflashing. The vulnerability is constrained by bootloader signature verification that prevents installation of unsigned firmware or arbitrary code execution. No patch is currently available for affected Linux and UC firmware versions.

Linux Privilege Escalation V1202 Ct T Firmware +34
NVD
CVE-2026-0714
EPSS 0% CVSS 6.8
MEDIUM This Month

TPM-backed LUKS encryption bypass in Moxa Industrial Linux 3 on select industrial computers allows an attacker with invasive physical access to the SPI bus to intercept TPM communications and decrypt eMMC storage contents offline. This attack requires opening the device and connecting specialized equipment for extended signal capture, making it impractical for opportunistic access scenarios. Affected products include V1222 Ct T, Uc 3430a T Lte Wifi, Uc 8220 T Lx, and Uc 4414a I T firmware variants.

Linux V1222 Ct T Firmware Uc 3430a T Lte Wifi Firmware +33
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy