Metrics
No CVSS v4.0
Attack Vector Physical
Attack Complexity Low
Privileges Required None
Scope Changed
Confidentiality Impact High
Integrity Impact High
Availability Impact High
User Interaction None
No CVSS v3.0
No CVSS v2
This CVE is not in the KEV list.
The EPSS score is 0.00103.
Exploitation none
Automatable no
Technical Impact total
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
Moxa
Subscribe
|
Uc-2101-lx
Subscribe
Uc-2101-lx Firmware
Subscribe
Uc-2102-lx
Subscribe
Uc-2102-lx Firmware
Subscribe
Uc-2102-t-lx
Subscribe
Uc-2102-t-lx Firmware
Subscribe
Uc-2104-lx
Subscribe
Uc-2104-lx Firmware
Subscribe
Uc-2111-lx
Subscribe
Uc-2111-lx Firmware
Subscribe
Uc-2112-lx
Subscribe
Uc-2112-lx Firmware
Subscribe
Uc-2114-t-lx
Subscribe
Uc-2114-t-lx Firmware
Subscribe
Uc-2116-t-lx
Subscribe
Uc-2116-t-lx Firmware
Subscribe
Uc-3101-t-ap-lx
Subscribe
Uc-3101-t-ap-lx Firmware
Subscribe
Uc-3101-t-eu-lx
Subscribe
Uc-3101-t-eu-lx Firmware
Subscribe
Uc-3101-t-us-lx
Subscribe
Uc-3101-t-us-lx Firmware
Subscribe
Uc-3111-t-ap-lx
Subscribe
Uc-3111-t-ap-lx-nw
Subscribe
Uc-3111-t-ap-lx-nw Firmware
Subscribe
Uc-3111-t-ap-lx Firmware
Subscribe
Uc-3111-t-eu-lx
Subscribe
Uc-3111-t-eu-lx-nw
Subscribe
Uc-3111-t-eu-lx-nw Firmware
Subscribe
Uc-3111-t-eu-lx Firmware
Subscribe
Uc-3111-t-us-lx
Subscribe
Uc-3111-t-us-lx-nw
Subscribe
Uc-3111-t-us-lx-nw Firmware
Subscribe
Uc-3111-t-us-lx Firmware
Subscribe
Uc-3121-t-ap-lx
Subscribe
Uc-3121-t-ap-lx Firmware
Subscribe
Uc-3121-t-eu-lx
Subscribe
Uc-3121-t-eu-lx Firmware
Subscribe
Uc-3121-t-us-lx
Subscribe
Uc-3121-t-us-lx Firmware
Subscribe
Uc-5101-lx
Subscribe
Uc-5101-lx Firmware
Subscribe
Uc-5101-t-lx
Subscribe
Uc-5101-t-lx Firmware
Subscribe
Uc-5102-lx
Subscribe
Uc-5102-lx Firmware
Subscribe
Uc-5102-t-lx
Subscribe
Uc-5102-t-lx Firmware
Subscribe
Uc-5111-lx
Subscribe
Uc-5111-lx Firmware
Subscribe
Uc-5111-t-lx
Subscribe
Uc-5111-t-lx Firmware
Subscribe
Uc-5112-lx
Subscribe
Uc-5112-lx Firmware
Subscribe
Uc-5112-t-lx
Subscribe
Uc-5112-t-lx Firmware
Subscribe
Uc-8112-lx
Subscribe
Uc-8112-lx Firmware
Subscribe
Uc-8112-me-t-lx
Subscribe
Uc-8112-me-t-lx1
Subscribe
Uc-8112-me-t-lx1 Firmware
Subscribe
Uc-8112-me-t-lx Firmware
Subscribe
Uc-8112a-me-t-lx
Subscribe
Uc-8112a-me-t-lx Firmware
Subscribe
Uc-8131-lx
Subscribe
Uc-8131-lx Firmware
Subscribe
Uc-8132-lx
Subscribe
Uc-8132-lx Firmware
Subscribe
Uc-8162-lx
Subscribe
Uc-8162-lx Firmware
Subscribe
Uc-8210-t-lx-s
Subscribe
Uc-8210-t-lx-s Firmware
Subscribe
Uc-8220-t-lx
Subscribe
Uc-8220-t-lx-ap-s
Subscribe
Uc-8220-t-lx-ap-s Firmware
Subscribe
Uc-8220-t-lx-eu-s
Subscribe
Uc-8220-t-lx-eu-s Firmware
Subscribe
Uc-8220-t-lx-s
Subscribe
Uc-8220-t-lx-s Firmware
Subscribe
Uc-8220-t-lx-us-s
Subscribe
Uc-8220-t-lx-us-s Firmware
Subscribe
Uc-8220-t-lx Firmware
Subscribe
Uc-8410a-lx
Subscribe
Uc-8410a-lx Firmware
Subscribe
Uc-8410a-nw-lx
Subscribe
Uc-8410a-nw-lx Firmware
Subscribe
Uc-8410a-nw-t-lx
Subscribe
Uc-8410a-nw-t-lx Firmware
Subscribe
Uc-8410a-t-lx
Subscribe
Uc-8410a-t-lx Firmware
Subscribe
Uc-8540-lx
Subscribe
Uc-8540-lx Firmware
Subscribe
Uc-8540-t-ct-lx
Subscribe
Uc-8540-t-ct-lx Firmware
Subscribe
Uc-8540-t-lx
Subscribe
Uc-8540-t-lx Firmware
Subscribe
Uc-8580-lx
Subscribe
Uc-8580-lx Firmware
Subscribe
Uc-8580-q-lx
Subscribe
Uc-8580-q-lx Firmware
Subscribe
Uc-8580-t-ct-lx
Subscribe
Uc-8580-t-ct-lx Firmware
Subscribe
Uc-8580-t-ct-q-lx
Subscribe
Uc-8580-t-ct-q-lx Firmware
Subscribe
Uc-8580-t-lx
Subscribe
Uc-8580-t-lx Firmware
Subscribe
Uc-8580-t-q-lx
Subscribe
Uc-8580-t-q-lx Firmware
Subscribe
|
Configuration 1 [-]
| AND |
|
Configuration 2 [-]
| AND |
|
Configuration 3 [-]
| AND |
|
Configuration 4 [-]
| AND |
|
Configuration 5 [-]
| AND |
|
Configuration 6 [-]
| AND |
|
Configuration 7 [-]
| AND |
|
Configuration 8 [-]
| AND |
|
Configuration 9 [-]
| AND |
|
Configuration 10 [-]
| AND |
|
Configuration 11 [-]
| AND |
|
Configuration 12 [-]
| AND |
|
Configuration 13 [-]
| AND |
|
Configuration 14 [-]
| AND |
|
Configuration 15 [-]
| AND |
|
Configuration 16 [-]
| AND |
|
Configuration 17 [-]
| AND |
|
Configuration 18 [-]
| AND |
|
Configuration 19 [-]
| AND |
|
Configuration 20 [-]
| AND |
|
Configuration 21 [-]
| AND |
|
Configuration 22 [-]
| AND |
|
Configuration 23 [-]
| AND |
|
Configuration 24 [-]
| AND |
|
Configuration 25 [-]
| AND |
|
Configuration 26 [-]
| AND |
|
Configuration 27 [-]
| AND |
|
Configuration 28 [-]
| AND |
|
Configuration 29 [-]
| AND |
|
Configuration 30 [-]
| AND |
|
Configuration 31 [-]
| AND |
|
Configuration 32 [-]
| AND |
|
Configuration 33 [-]
| AND |
|
Configuration 34 [-]
| AND |
|
Configuration 35 [-]
| AND |
|
Configuration 36 [-]
| AND |
|
Configuration 37 [-]
| AND |
|
Configuration 38 [-]
| AND |
|
Configuration 39 [-]
| AND |
|
Configuration 40 [-]
| AND |
|
Configuration 41 [-]
| AND |
|
Configuration 42 [-]
| AND |
|
Configuration 43 [-]
| AND |
|
Configuration 44 [-]
| AND |
|
Configuration 45 [-]
| AND |
|
Configuration 46 [-]
| AND |
|
Configuration 47 [-]
| AND |
|
Configuration 48 [-]
| AND |
|
Configuration 49 [-]
| AND |
|
Configuration 50 [-]
| AND |
|
Configuration 51 [-]
| AND |
|
Configuration 52 [-]
| AND |
|
Configuration 53 [-]
| AND |
|
Configuration 54 [-]
| AND |
|
No data.
No data.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-23526 | An attacker with physical access to the affected Moxa UC Series devices can initiate a restart of the device and gain access to its BIOS. Command line options can then be altered, allowing the attacker to access the terminal. From the terminal, the attacker can modify the device’s authentication files to create a new user and gain full access to the system. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://www.cisa.gov/uscert/ics/advisories/icsa-22-333-04 |
|
Thu, 16 Jan 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-01-16T21:55:20.265Z
Reserved: 2023-03-07T16:16:20.728Z
Link: CVE-2023-1257
Updated: 2024-08-02T05:40:59.879Z
Status : Modified
Published: 2023-03-07T17:15:12.527
Modified: 2024-11-21T07:38:46.613
Link: CVE-2023-1257
No data.
OpenCVE Enrichment
No data.
No weakness.
EUVD