CVSS3
Attack Vector
PHYSICAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
25.9%
An attacker with physical access to the affected Moxa UC Series devices can initiate a restart of the device and gain access to its BIOS. Command line options can then be altered, allowing the attacker to access the terminal. From the terminal, the attacker can modify the deviceβs authentication files to create a new user and gain full access to the system.
Vendor | Product | Version | CPE |
---|---|---|---|
moxa | uc-2101-lx_firmware | * | cpe:2.3:o:moxa:uc-2101-lx_firmware:*:*:*:*:*:*:*:* |
moxa | uc-2101-lx | - | cpe:2.3:h:moxa:uc-2101-lx:-:*:*:*:*:*:*:* |
moxa | uc-2102-lx_firmware | * | cpe:2.3:o:moxa:uc-2102-lx_firmware:*:*:*:*:*:*:*:* |
moxa | uc-2102-lx | - | cpe:2.3:h:moxa:uc-2102-lx:-:*:*:*:*:*:*:* |
moxa | uc-2102-t-lx_firmware | * | cpe:2.3:o:moxa:uc-2102-t-lx_firmware:*:*:*:*:*:*:*:* |
moxa | uc-2102-t-lx | - | cpe:2.3:h:moxa:uc-2102-t-lx:-:*:*:*:*:*:*:* |
moxa | uc-2104-lx_firmware | * | cpe:2.3:o:moxa:uc-2104-lx_firmware:*:*:*:*:*:*:*:* |
moxa | uc-2104-lx | - | cpe:2.3:h:moxa:uc-2104-lx:-:*:*:*:*:*:*:* |
moxa | uc-2111-lx_firmware | * | cpe:2.3:o:moxa:uc-2111-lx_firmware:*:*:*:*:*:*:*:* |
moxa | uc-2111-lx | - | cpe:2.3:h:moxa:uc-2111-lx:-:*:*:*:*:*:*:* |
CVSS3
Attack Vector
PHYSICAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
25.9%