A vulnerability exists in serial device servers where active debug code remains enabled in the UART interface. An attacker with physical access to the device can directly connect to the UART interface and, without authentication, user interaction, or execution conditions, gain unauthorized access to internal debug functionality. Exploitation is low complexity and allows an attacker to execute privileged operations and access sensitive system resources, resulting in a high impact to the confidentiality, integrity, and availability of the affected device. No security impact to external or dependent systems has been identified.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

* For the NPort 5000 Series, make sure that the physical protection of the NPort devices and/or the system meets the security needs of your application. By limiting physical access to authorized personnel, you significantly reduce the risk of local cyberattacks. Please refer to The Security Hardening Guide for NPort 5000 Series (v2.4 or later) https://www.moxa.com/en/products/industrial-edge-connectivity/serial-device-servers/general-device-servers/nport-5100-series#resources  for more information.

History

Wed, 31 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 31 Dec 2025 08:00:00 +0000

Type Values Removed Values Added
Description A vulnerability exists in serial device servers where active debug code remains enabled in the UART interface. An attacker with physical access to the device can directly connect to the UART interface and, without authentication, user interaction, or execution conditions, gain unauthorized access to internal debug functionality. Exploitation is low complexity and allows an attacker to execute privileged operations and access sensitive system resources, resulting in a high impact to the confidentiality, integrity, and availability of the affected device. No security impact to external or dependent systems has been identified.
First Time appeared Moxa
Moxa nport 5000ai-m12 Series
Moxa nport 5100 Series
Moxa nport 5100a Series
Moxa nport 5200 Series
Moxa nport 5200a Series
Moxa nport 5400 Series
Moxa nport 5600-dt Series
Moxa nport 5600 Series
Moxa nport Ia5000-g2 Series
Moxa nport Ia5000 Series
Moxa nport Ia5000a Series
Weaknesses CWE-489
CPEs cpe:2.3:a:moxa:nport_5000ai-m12_series:1.0:*:*:*:*:*:*:*
cpe:2.3:a:moxa:nport_5100_series:1.0:*:*:*:*:*:*:*
cpe:2.3:a:moxa:nport_5100a_series:1.0:*:*:*:*:*:*:*
cpe:2.3:a:moxa:nport_5200_series:1.0:*:*:*:*:*:*:*
cpe:2.3:a:moxa:nport_5200a_series:1.0:*:*:*:*:*:*:*
cpe:2.3:a:moxa:nport_5400_series:1.0:*:*:*:*:*:*:*
cpe:2.3:a:moxa:nport_5600-dt_series:1.0:*:*:*:*:*:*:*
cpe:2.3:a:moxa:nport_5600_series:1.0:*:*:*:*:*:*:*
cpe:2.3:a:moxa:nport_ia5000-g2_series:1.0:*:*:*:*:*:*:*
cpe:2.3:a:moxa:nport_ia5000_series:1.0:*:*:*:*:*:*:*
cpe:2.3:a:moxa:nport_ia5000a_series:1.0:*:*:*:*:*:*:*
Vendors & Products Moxa
Moxa nport 5000ai-m12 Series
Moxa nport 5100 Series
Moxa nport 5100a Series
Moxa nport 5200 Series
Moxa nport 5200a Series
Moxa nport 5400 Series
Moxa nport 5600-dt Series
Moxa nport 5600 Series
Moxa nport Ia5000-g2 Series
Moxa nport Ia5000 Series
Moxa nport Ia5000a Series
References
Metrics cvssV4_0

{'score': 7, 'vector': 'CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Moxa

Published:

Updated: 2025-12-31T16:06:32.337Z

Reserved: 2025-12-22T02:07:12.459Z

Link: CVE-2025-15017

cve-icon Vulnrichment

Updated: 2025-12-31T16:06:29.268Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-31T08:15:44.303

Modified: 2025-12-31T20:42:15.637

Link: CVE-2025-15017

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses