Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-23526 | An attacker with physical access to the affected Moxa UC Series devices can initiate a restart of the device and gain access to its BIOS. Command line options can then be altered, allowing the attacker to access the terminal. From the terminal, the attacker can modify the device’s authentication files to create a new user and gain full access to the system. |
| Link | Providers |
|---|---|
| https://www.cisa.gov/uscert/ics/advisories/icsa-22-333-04 |
|
Thu, 16 Jan 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-01-16T21:55:20.265Z
Reserved: 2023-03-07T16:16:20.728Z
Link: CVE-2023-1257
Updated: 2024-08-02T05:40:59.879Z
Status : Modified
Published: 2023-03-07T17:15:12.527
Modified: 2024-11-21T07:38:46.613
Link: CVE-2023-1257
No data.
OpenCVE Enrichment
No data.
No weakness.
EUVD