Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0714: CWE-319: Cleartext Transmission of Sensitive Information in Moxa UC-1200A Series

0
High
VulnerabilityCVE-2026-0714cvecve-2026-0714cwe-319
Published: Thu Feb 05 2026 (02/05/2026, 16:58:50 UTC)
Source: CVE Database V5
Vendor/Project: Moxa
Product: UC-1200A Series

Description

CVE-2026-0714 is a high-severity vulnerability affecting Moxa UC-1200A Series industrial computers using TPM-backed LUKS full-disk encryption on Moxa Industrial Linux 3. The discrete TPM communicates with the CPU via an SPI bus, which can be physically tapped by an attacker with extended physical access and specialized equipment. This invasive attack requires opening the device and attaching to the SPI bus to capture TPM communication signals, enabling offline decryption of the device's eMMC storage. Remote or brief physical access attacks are not feasible. The vulnerability impacts confidentiality severely but does not affect availability or integrity directly. No known exploits are currently in the wild. European industrial environments using these devices should prioritize physical security and consider hardware redesign or firmware updates once available.

AI-Powered Analysis

AILast updated: 02/05/2026, 17:29:43 UTC

Technical Analysis

CVE-2026-0714 identifies a vulnerability in the Moxa UC-1200A Series industrial computers that utilize TPM-backed LUKS full-disk encryption on Moxa Industrial Linux 3. The discrete TPM module is connected to the CPU via an SPI (Serial Peripheral Interface) bus, which is susceptible to physical side-channel attacks. An attacker with extended physical access can open the device enclosure and attach specialized equipment to the SPI bus lines to capture TPM communication signals. These signals contain sensitive cryptographic material that, once captured, can be analyzed offline to decrypt the eMMC storage contents protected by LUKS encryption. The attack requires invasive physical access, possession of the device for a prolonged period, and technical expertise in signal capture and cryptanalysis. It does not require any user interaction, authentication, or remote network access, making it a purely physical attack vector. The vulnerability is classified under CWE-319, indicating cleartext transmission of sensitive information, here manifested as unprotected TPM bus communication. The CVSS 4.0 score is 7.0 (high), reflecting the high confidentiality impact but limited attack vector (physical only) and no impact on integrity or availability. No patches or firmware updates have been published yet, and no exploits are known in the wild. This vulnerability highlights a hardware design weakness where TPM communication is not adequately protected against physical probing attacks.

Potential Impact

For European organizations, particularly those in critical infrastructure sectors such as manufacturing, energy, transportation, and utilities that deploy Moxa UC-1200A Series industrial computers, this vulnerability poses a significant risk to data confidentiality. If attackers gain prolonged physical access to these devices, they could extract sensitive operational data, intellectual property, or cryptographic keys stored on the device. This could lead to espionage, sabotage, or further compromise of industrial control systems. Although the attack does not enable remote exploitation, the requirement for invasive physical access means insider threats or attackers with physical access to secure areas pose the greatest risk. The impact on system integrity and availability is minimal, but the breach of confidentiality could have cascading effects on operational security and compliance with European data protection regulations such as GDPR if personal or sensitive data is involved. The lack of remote exploitability limits the threat scope but does not eliminate risk in environments where physical security is insufficient.

Mitigation Recommendations

European organizations should implement stringent physical security controls around Moxa UC-1200A devices, including tamper-evident seals, locked enclosures, and restricted access to areas housing these devices. Regular physical inspections should be conducted to detect signs of tampering. Network segmentation and monitoring should be employed to detect anomalous device behavior that could indicate compromise. Until a firmware or hardware patch is available, consider deploying additional encryption layers or using devices with TPM modules connected via more secure interfaces that resist physical probing. Where feasible, replace affected devices with models that have improved TPM bus protections or alternative encryption architectures. Educate personnel on the risks of insider threats and enforce strict access control policies. Maintain an inventory of affected devices and track any physical access events. Collaborate with Moxa for updates and apply any future patches promptly. For critical environments, consider hardware security modules (HSMs) or external encryption devices that do not expose sensitive signals on accessible buses.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Moxa
Date Reserved
2026-01-08T10:25:22.303Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6984d01df9fa50a62f2f1645

Added to database: 2/5/2026, 5:15:09 PM

Last enriched: 2/5/2026, 5:29:43 PM

Last updated: 2/5/2026, 8:36:36 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats