A vulnerability exists in serial device servers where active debug code remains enabled in the UART interface. An attacker with physical access to the device can directly connect to the UART interface and, without authentication, user interaction, or execution conditions, gain unauthorized access to internal debug functionality. Exploitation is low complexity and allows an attacker to execute privileged operations and access sensitive system resources, resulting in a high impact to the confidentiality, integrity, and availability of the affected device. No security impact to external or dependent systems has been identified.
Metrics
Affected Vendors & Products
References
History
Wed, 31 Dec 2025 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability exists in serial device servers where active debug code remains enabled in the UART interface. An attacker with physical access to the device can directly connect to the UART interface and, without authentication, user interaction, or execution conditions, gain unauthorized access to internal debug functionality. Exploitation is low complexity and allows an attacker to execute privileged operations and access sensitive system resources, resulting in a high impact to the confidentiality, integrity, and availability of the affected device. No security impact to external or dependent systems has been identified. | |
| First Time appeared |
Moxa
Moxa nport 5000ai-m12 Series Moxa nport 5100 Series Moxa nport 5100a Series Moxa nport 5200 Series Moxa nport 5200a Series Moxa nport 5400 Series Moxa nport 5600-dt Series Moxa nport 5600 Series Moxa nport Ia5000-g2 Series Moxa nport Ia5000 Series Moxa nport Ia5000a Series |
|
| Weaknesses | CWE-489 | |
| CPEs | cpe:2.3:a:moxa:nport_5000ai-m12_series:1.0:*:*:*:*:*:*:* cpe:2.3:a:moxa:nport_5100_series:1.0:*:*:*:*:*:*:* cpe:2.3:a:moxa:nport_5100a_series:1.0:*:*:*:*:*:*:* cpe:2.3:a:moxa:nport_5200_series:1.0:*:*:*:*:*:*:* cpe:2.3:a:moxa:nport_5200a_series:1.0:*:*:*:*:*:*:* cpe:2.3:a:moxa:nport_5400_series:1.0:*:*:*:*:*:*:* cpe:2.3:a:moxa:nport_5600-dt_series:1.0:*:*:*:*:*:*:* cpe:2.3:a:moxa:nport_5600_series:1.0:*:*:*:*:*:*:* cpe:2.3:a:moxa:nport_ia5000-g2_series:1.0:*:*:*:*:*:*:* cpe:2.3:a:moxa:nport_ia5000_series:1.0:*:*:*:*:*:*:* cpe:2.3:a:moxa:nport_ia5000a_series:1.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Moxa
Moxa nport 5000ai-m12 Series Moxa nport 5100 Series Moxa nport 5100a Series Moxa nport 5200 Series Moxa nport 5200a Series Moxa nport 5400 Series Moxa nport 5600-dt Series Moxa nport 5600 Series Moxa nport Ia5000-g2 Series Moxa nport Ia5000 Series Moxa nport Ia5000a Series |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Moxa
Published:
Updated: 2025-12-31T07:44:24.344Z
Reserved: 2025-12-22T02:07:12.459Z
Link: CVE-2025-15017
No data.
Status : Received
Published: 2025-12-31T08:15:44.303
Modified: 2025-12-31T08:15:44.303
Link: CVE-2025-15017
No data.
OpenCVE Enrichment
No data.