Physical Attack Vulnerability in Moxa Industrial Computers
CVE-2026-0714
What is CVE-2026-0714?
CVE-2026-0714 is a physical attack vulnerability identified in specific Moxa industrial computers, which employ TPM-backed LUKS full-disk encryption on the Moxa Industrial Linux 3 platform. This vulnerability arises from the design of the discrete Trusted Platform Module (TPM), which connects to the computer's CPU via an SPI (Serial Peripheral Interface) bus. Exploitation of this vulnerability necessitates invasive physical access to the device, including the ability to open the hardware and employ external apparatus to tap into the SPI bus.
Successful exploitation could compromise the security of the stored data, enabling an attacker to decrypt the encrypted contents of the embedded MultiMediaCard (eMMC). Due to the prerequisites for this attack, which include extended physical access and sophisticated equipment for signal capture and analysis, the risk is particularly oriented towards environments where these computers are deployed in less secure or physically accessible settings.
Potential impact of CVE-2026-0714
-
Data Breach Risk: The primary impact of CVE-2026-0714 is the potential for a data breach. If an attacker successfully exploits this vulnerability, they could gain access to sensitive information stored on the Moxa industrial computers, leading to significant operational and reputational damage for the affected organization.
-
Operational Disruption: With access to critical systems and data, an intruder could execute further attacks or manipulate system operations, causing disruptions to industrial processes. This could lead to downtime, loss of productivity, and potential safety hazards within an industrial environment.
-
Threat to System Integrity: The vulnerability undermines the integrity of the encryption system designed to protect sensitive data. Decryption of the eMMC contents could enable attackers to insert malicious code or perform unauthorized modifications, compromising the overall security posture of the organization using the affected devices.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
UC-1200A Series 1.0 <= 1.4
References
CVSS V4
Timeline
Vulnerability published
Vulnerability Reserved