An attacker with physical access to the affected Moxa UC Series devices can initiate a restart of the device and gain access to its BIOS. Command line options can then be altered, allowing the attacker to access the terminal. From the terminal, the attacker can modify the device’s authentication files to create a new user and gain full access to the system.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Moxa
Subscribe
|
Uc-2101-lx
Subscribe
Uc-2101-lx Firmware
Subscribe
Uc-2102-lx
Subscribe
Uc-2102-lx Firmware
Subscribe
Uc-2102-t-lx
Subscribe
Uc-2102-t-lx Firmware
Subscribe
Uc-2104-lx
Subscribe
Uc-2104-lx Firmware
Subscribe
Uc-2111-lx
Subscribe
Uc-2111-lx Firmware
Subscribe
Uc-2112-lx
Subscribe
Uc-2112-lx Firmware
Subscribe
Uc-2114-t-lx
Subscribe
Uc-2114-t-lx Firmware
Subscribe
Uc-2116-t-lx
Subscribe
Uc-2116-t-lx Firmware
Subscribe
Uc-3101-t-ap-lx
Subscribe
Uc-3101-t-ap-lx Firmware
Subscribe
Uc-3101-t-eu-lx
Subscribe
Uc-3101-t-eu-lx Firmware
Subscribe
Uc-3101-t-us-lx
Subscribe
Uc-3101-t-us-lx Firmware
Subscribe
Uc-3111-t-ap-lx
Subscribe
Uc-3111-t-ap-lx-nw
Subscribe
Uc-3111-t-ap-lx-nw Firmware
Subscribe
Uc-3111-t-ap-lx Firmware
Subscribe
Uc-3111-t-eu-lx
Subscribe
Uc-3111-t-eu-lx-nw
Subscribe
Uc-3111-t-eu-lx-nw Firmware
Subscribe
Uc-3111-t-eu-lx Firmware
Subscribe
Uc-3111-t-us-lx
Subscribe
Uc-3111-t-us-lx-nw
Subscribe
Uc-3111-t-us-lx-nw Firmware
Subscribe
Uc-3111-t-us-lx Firmware
Subscribe
Uc-3121-t-ap-lx
Subscribe
Uc-3121-t-ap-lx Firmware
Subscribe
Uc-3121-t-eu-lx
Subscribe
Uc-3121-t-eu-lx Firmware
Subscribe
Uc-3121-t-us-lx
Subscribe
Uc-3121-t-us-lx Firmware
Subscribe
Uc-5101-lx
Subscribe
Uc-5101-lx Firmware
Subscribe
Uc-5101-t-lx
Subscribe
Uc-5101-t-lx Firmware
Subscribe
Uc-5102-lx
Subscribe
Uc-5102-lx Firmware
Subscribe
Uc-5102-t-lx
Subscribe
Uc-5102-t-lx Firmware
Subscribe
Uc-5111-lx
Subscribe
Uc-5111-lx Firmware
Subscribe
Uc-5111-t-lx
Subscribe
Uc-5111-t-lx Firmware
Subscribe
Uc-5112-lx
Subscribe
Uc-5112-lx Firmware
Subscribe
Uc-5112-t-lx
Subscribe
Uc-5112-t-lx Firmware
Subscribe
Uc-8112-lx
Subscribe
Uc-8112-lx Firmware
Subscribe
Uc-8112-me-t-lx
Subscribe
Uc-8112-me-t-lx1
Subscribe
Uc-8112-me-t-lx1 Firmware
Subscribe
Uc-8112-me-t-lx Firmware
Subscribe
Uc-8112a-me-t-lx
Subscribe
Uc-8112a-me-t-lx Firmware
Subscribe
Uc-8131-lx
Subscribe
Uc-8131-lx Firmware
Subscribe
Uc-8132-lx
Subscribe
Uc-8132-lx Firmware
Subscribe
Uc-8162-lx
Subscribe
Uc-8162-lx Firmware
Subscribe
Uc-8210-t-lx-s
Subscribe
Uc-8210-t-lx-s Firmware
Subscribe
Uc-8220-t-lx
Subscribe
Uc-8220-t-lx-ap-s
Subscribe
Uc-8220-t-lx-ap-s Firmware
Subscribe
Uc-8220-t-lx-eu-s
Subscribe
Uc-8220-t-lx-eu-s Firmware
Subscribe
Uc-8220-t-lx-s
Subscribe
Uc-8220-t-lx-s Firmware
Subscribe
Uc-8220-t-lx-us-s
Subscribe
Uc-8220-t-lx-us-s Firmware
Subscribe
Uc-8220-t-lx Firmware
Subscribe
Uc-8410a-lx
Subscribe
Uc-8410a-lx Firmware
Subscribe
Uc-8410a-nw-lx
Subscribe
Uc-8410a-nw-lx Firmware
Subscribe
Uc-8410a-nw-t-lx
Subscribe
Uc-8410a-nw-t-lx Firmware
Subscribe
Uc-8410a-t-lx
Subscribe
Uc-8410a-t-lx Firmware
Subscribe
Uc-8540-lx
Subscribe
Uc-8540-lx Firmware
Subscribe
Uc-8540-t-ct-lx
Subscribe
Uc-8540-t-ct-lx Firmware
Subscribe
Uc-8540-t-lx
Subscribe
Uc-8540-t-lx Firmware
Subscribe
Uc-8580-lx
Subscribe
Uc-8580-lx Firmware
Subscribe
Uc-8580-q-lx
Subscribe
Uc-8580-q-lx Firmware
Subscribe
Uc-8580-t-ct-lx
Subscribe
Uc-8580-t-ct-lx Firmware
Subscribe
Uc-8580-t-ct-q-lx
Subscribe
Uc-8580-t-ct-q-lx Firmware
Subscribe
Uc-8580-t-lx
Subscribe
Uc-8580-t-lx Firmware
Subscribe
Uc-8580-t-q-lx
Subscribe
Uc-8580-t-q-lx Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-23526 | An attacker with physical access to the affected Moxa UC Series devices can initiate a restart of the device and gain access to its BIOS. Command line options can then be altered, allowing the attacker to access the terminal. From the terminal, the attacker can modify the device’s authentication files to create a new user and gain full access to the system. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://www.cisa.gov/uscert/ics/advisories/icsa-22-333-04 |
|
History
Thu, 16 Jan 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-01-16T21:55:20.265Z
Reserved: 2023-03-07T16:16:20.728Z
Link: CVE-2023-1257
Updated: 2024-08-02T05:40:59.879Z
Status : Modified
Published: 2023-03-07T17:15:12.527
Modified: 2024-11-21T07:38:46.613
Link: CVE-2023-1257
No data.
OpenCVE Enrichment
No data.
Weaknesses
No weakness.
EUVD