Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
* For the NPort 5000 Series, make sure that the physical protection of the NPort devices and/or the system meets the security needs of your application. By limiting physical access to authorized personnel, you significantly reduce the risk of local cyberattacks. Please refer to The Security Hardening Guide for NPort 5000 Series (v2.4 or later) https://www.moxa.com/en/products/industrial-edge-connectivity/serial-device-servers/general-device-servers/nport-5100-series#resources for more information.
Wed, 31 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 31 Dec 2025 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability exists in serial device servers where active debug code remains enabled in the UART interface. An attacker with physical access to the device can directly connect to the UART interface and, without authentication, user interaction, or execution conditions, gain unauthorized access to internal debug functionality. Exploitation is low complexity and allows an attacker to execute privileged operations and access sensitive system resources, resulting in a high impact to the confidentiality, integrity, and availability of the affected device. No security impact to external or dependent systems has been identified. | |
| First Time appeared |
Moxa
Moxa nport 5000ai-m12 Series Moxa nport 5100 Series Moxa nport 5100a Series Moxa nport 5200 Series Moxa nport 5200a Series Moxa nport 5400 Series Moxa nport 5600-dt Series Moxa nport 5600 Series Moxa nport Ia5000-g2 Series Moxa nport Ia5000 Series Moxa nport Ia5000a Series |
|
| Weaknesses | CWE-489 | |
| CPEs | cpe:2.3:a:moxa:nport_5000ai-m12_series:1.0:*:*:*:*:*:*:* cpe:2.3:a:moxa:nport_5100_series:1.0:*:*:*:*:*:*:* cpe:2.3:a:moxa:nport_5100a_series:1.0:*:*:*:*:*:*:* cpe:2.3:a:moxa:nport_5200_series:1.0:*:*:*:*:*:*:* cpe:2.3:a:moxa:nport_5200a_series:1.0:*:*:*:*:*:*:* cpe:2.3:a:moxa:nport_5400_series:1.0:*:*:*:*:*:*:* cpe:2.3:a:moxa:nport_5600-dt_series:1.0:*:*:*:*:*:*:* cpe:2.3:a:moxa:nport_5600_series:1.0:*:*:*:*:*:*:* cpe:2.3:a:moxa:nport_ia5000-g2_series:1.0:*:*:*:*:*:*:* cpe:2.3:a:moxa:nport_ia5000_series:1.0:*:*:*:*:*:*:* cpe:2.3:a:moxa:nport_ia5000a_series:1.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Moxa
Moxa nport 5000ai-m12 Series Moxa nport 5100 Series Moxa nport 5100a Series Moxa nport 5200 Series Moxa nport 5200a Series Moxa nport 5400 Series Moxa nport 5600-dt Series Moxa nport 5600 Series Moxa nport Ia5000-g2 Series Moxa nport Ia5000 Series Moxa nport Ia5000a Series |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Moxa
Published:
Updated: 2025-12-31T16:06:32.337Z
Reserved: 2025-12-22T02:07:12.459Z
Link: CVE-2025-15017
Updated: 2025-12-31T16:06:29.268Z
Status : Awaiting Analysis
Published: 2025-12-31T08:15:44.303
Modified: 2025-12-31T20:42:15.637
Link: CVE-2025-15017
No data.
OpenCVE Enrichment
No data.