CVE-2023-1257
high-risk
Published 2023-03-07
An attacker with physical access to the affected Moxa UC Series devices can initiate a restart of the device and gain access to its BIOS. Command line options can then be altered, allowing the attacker to access the terminal. From the terminal, the attacker can modify the device’s authentication files to create a new user and gain full access to the system.
Do I need to act?
-
0.10% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.6/10
High
PHYSICAL
/ LOW complexity
Affected Products (20)
Uc-2101-Lx Firmware
Uc-2102-Lx Firmware
Uc-2102-T-Lx Firmware
Uc-2104-Lx Firmware
Uc-2111-Lx Firmware
Uc-2112-Lx Firmware
Uc-2114-T-Lx Firmware
Uc-2114-T-Lx Firmware
Uc-2116-T-Lx Firmware
Uc-3101-T-Ap-Lx Firmware
Uc-3101-T-Eu-Lx Firmware
Uc-3101-T-Us-Lx Firmware
Uc-3111-T-Ap-Lx Firmware
Uc-3111-T-Ap-Lx-Nw Firmware
Uc-3111-T-Eu-Lx Firmware
Uc-3111-T-Eu-Lx-Nw Firmware
Uc-3111-T-Us-Lx Firmware
Uc-3111-T-Us-Lx-Nw Firmware
Uc-3121-T-Ap-Lx Firmware
Uc-3121-T-Eu-Lx Firmware
Affected Vendors
References (2)
Third Party Advisory
https://www.cisa.gov/uscert/ics/advisories/icsa-22-333-04
Third Party Advisory
https://www.cisa.gov/uscert/ics/advisories/icsa-22-333-04
50
/ 100
high-risk
Severity
24/34 · High
Exploitability
0/34 · Minimal
Exposure
26/34 · High