Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11084: CWE-1390: Weak Authentication in Rockwell Automation FactoryTalk® DataMosaix™ Private Cloud

0
High
VulnerabilityCVE-2025-11084cvecve-2025-11084cwe-1390
Published: Tue Nov 11 2025 (11/11/2025, 13:26:05 UTC)
Source: CVE Database V5
Vendor/Project: Rockwell Automation
Product: FactoryTalk® DataMosaix™ Private Cloud

Description

A security issue exists within DataMosaix™ Private Cloud, allowing attackers to bypass MFA during setup and obtain a valid login-token cookie without knowing the users password. This vulnerability occurs when MFA is enabled but not completed within a 7-day period.

AI-Powered Analysis

AILast updated: 11/18/2025, 14:34:35 UTC

Technical Analysis

CVE-2025-11084 is a security vulnerability classified under CWE-1390, indicating weak authentication mechanisms within Rockwell Automation's FactoryTalk® DataMosaix™ Private Cloud software. The vulnerability specifically arises during the MFA setup process. When MFA is enabled but not fully completed within a 7-day timeframe, the system fails to enforce MFA properly, allowing an attacker to bypass it. This bypass enables the attacker to obtain a valid login-token cookie without knowledge of the user's password, granting unauthorized access to the system. The affected versions include 7.11, 8.00, and 8.01. The CVSS 4.0 score is 7.6, reflecting high severity with an attack vector that is adjacent network (AV:A), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality and integrity (VC:H, VI:H). The vulnerability does not require authentication or user interaction, but the attacker must have network access to the affected system. No patches are currently listed, and no exploits have been observed in the wild. This vulnerability is critical for environments relying on FactoryTalk® DataMosaix™ Private Cloud for industrial automation data management, as unauthorized access could lead to data breaches and operational interference.

Potential Impact

For European organizations, particularly those in manufacturing, industrial automation, and critical infrastructure sectors that rely on Rockwell Automation's FactoryTalk® DataMosaix™ Private Cloud, this vulnerability poses a significant risk. Unauthorized access through MFA bypass can lead to exposure of sensitive operational data, intellectual property theft, and potential manipulation of industrial processes. This could result in operational downtime, financial losses, and damage to reputation. The ability to obtain a valid login token without a password undermines trust in the authentication system and may facilitate further lateral movement within the network. Given the high adoption of Rockwell Automation products in European industrial hubs, the impact could be widespread. Additionally, regulatory compliance issues may arise if personal or sensitive data is compromised, leading to potential fines under GDPR. The lack of known exploits currently provides a window for proactive mitigation, but the high severity score indicates that exploitation could have serious consequences.

Mitigation Recommendations

1. Enforce strict policies requiring MFA setup completion within a shorter timeframe than 7 days or disable accounts that do not complete MFA setup promptly. 2. Implement continuous monitoring and alerting for incomplete MFA setups and unusual token issuance activities. 3. Restrict network access to FactoryTalk® DataMosaix™ Private Cloud management interfaces to trusted IP ranges and use network segmentation to limit exposure. 4. Apply vendor patches immediately once available; engage with Rockwell Automation support to obtain updates or workarounds. 5. Conduct regular audits of authentication logs to detect anomalous login-token issuance or usage patterns. 6. Educate administrators and users about the importance of completing MFA setup promptly and securely. 7. Consider deploying additional compensating controls such as Web Application Firewalls (WAF) to detect and block suspicious authentication bypass attempts. 8. Integrate threat intelligence feeds to stay informed about emerging exploits targeting this vulnerability. 9. Review and harden overall identity and access management policies surrounding the affected product. 10. Prepare incident response plans specifically addressing potential unauthorized access scenarios related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Rockwell
Date Reserved
2025-09-26T14:49:57.904Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69133f64e55e7c79b8ca8fee

Added to database: 11/11/2025, 1:51:32 PM

Last enriched: 11/18/2025, 2:34:35 PM

Last updated: 12/27/2025, 10:17:02 AM

Views: 99

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats