Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15017: CWE-489: Active Debug Code in Moxa NPort 5000AI-M12 Series

0
High
VulnerabilityCVE-2025-15017cvecve-2025-15017cwe-489
Published: Wed Dec 31 2025 (12/31/2025, 07:44:24 UTC)
Source: CVE Database V5
Vendor/Project: Moxa
Product: NPort 5000AI-M12 Series

Description

CVE-2025-15017 is a high-severity vulnerability affecting Moxa NPort 5000AI-M12 Series serial device servers, where active debug code remains enabled on the UART interface. An attacker with physical access can connect directly to the UART interface and gain unauthorized privileged access without authentication or user interaction. This allows execution of privileged operations and access to sensitive system resources, severely impacting confidentiality, integrity, and availability of the device. Exploitation complexity is low, but no remote exploitation or impact on external systems has been identified. The vulnerability affects version 1. 0 of the product and has a CVSS 4. 0 score of 7. 0. No known exploits are currently in the wild, and no patches have been published yet. European organizations using these devices in critical infrastructure or industrial environments should prioritize physical security and monitor for updates from the vendor.

AI-Powered Analysis

AILast updated: 01/07/2026, 13:04:53 UTC

Technical Analysis

CVE-2025-15017 is a vulnerability classified under CWE-489 (Active Debug Code) found in the Moxa NPort 5000AI-M12 Series serial device servers, specifically version 1.0. The flaw arises because active debug code remains enabled on the UART interface, which is a hardware serial communication port typically used for device management or debugging. An attacker with physical access can directly connect to this UART interface and access internal debug functions without requiring any authentication, user interaction, or specific execution conditions. This direct access allows the attacker to perform privileged operations, potentially including reading or modifying sensitive system resources, firmware, or configuration data. The vulnerability has a CVSS 4.0 base score of 7.0, indicating high severity, with attack vector being physical (AV:P), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H, I:H, A:H). Since the attack requires physical access, remote exploitation is not feasible, and no impact on external or dependent systems has been identified. No patches or mitigations have been officially released at the time of publication, and no known exploits are reported in the wild. This vulnerability is critical for environments where these devices are deployed in physically accessible locations, such as industrial control systems, manufacturing, or critical infrastructure networks.

Potential Impact

For European organizations, the impact of CVE-2025-15017 is significant in sectors relying on Moxa NPort 5000AI-M12 Series devices for serial communication and device management, especially in industrial automation, manufacturing, energy, and transportation. Unauthorized physical access to these devices can lead to full compromise of the device’s internal functions, potentially disrupting operations, leaking sensitive configuration or operational data, or enabling further attacks within the local network. The confidentiality, integrity, and availability of the affected devices are all at high risk, which could result in operational downtime, safety hazards, or regulatory non-compliance. However, since exploitation requires physical access, the threat is mitigated in highly secured environments but remains critical in locations with less stringent physical security controls. No direct impact on connected external systems has been identified, limiting the scope to the compromised device itself. Nonetheless, compromised devices in critical infrastructure could serve as footholds for attackers to escalate attacks locally.

Mitigation Recommendations

European organizations should immediately assess the physical security of all locations where Moxa NPort 5000AI-M12 Series devices are deployed, ensuring restricted access to prevent unauthorized physical connections to UART interfaces. Network segmentation should be enforced to isolate these devices from broader networks, limiting potential lateral movement if compromised. Until an official patch is released, consider disabling or physically blocking access to UART ports where feasible. Implement strict inventory and asset management to identify all affected devices and monitor for unusual device behavior or unauthorized physical access attempts. Engage with Moxa for updates on patches or firmware upgrades addressing this vulnerability. Additionally, incorporate this vulnerability into risk assessments and incident response plans, emphasizing physical security controls and rapid response to detected intrusions. Regularly audit and update physical access policies in industrial and operational technology environments to reduce exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Moxa
Date Reserved
2025-12-22T02:07:12.459Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6954d7bedb813ff03ed404d3

Added to database: 12/31/2025, 7:58:54 AM

Last enriched: 1/7/2026, 1:04:53 PM

Last updated: 2/7/2026, 2:49:36 PM

Views: 84

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats