CVE-2025-11084: CWE-1390: Weak Authentication in Rockwell Automation FactoryTalk® DataMosaix™ Private Cloud
A security issue exists within DataMosaix™ Private Cloud, allowing attackers to bypass MFA during setup and obtain a valid login-token cookie without knowing the users password. This vulnerability occurs when MFA is enabled but not completed within a 7-day period.
AI Analysis
Technical Summary
CVE-2025-11084 is a vulnerability classified under CWE-1390 (Weak Authentication) affecting Rockwell Automation's FactoryTalk® DataMosaix™ Private Cloud versions 7.11, 8.00, and 8.01. The flaw arises during the MFA setup process: when MFA is enabled but not fully completed within a 7-day period, an attacker can bypass the MFA mechanism entirely. This bypass allows the attacker to obtain a valid login-token cookie without needing the user's password, effectively granting unauthorized access to the system. The vulnerability is exploitable remotely but requires adjacent network access, indicating that the attacker must be on the same local network or have similar network proximity. The CVSS 4.0 score is 7.6 (high severity), reflecting the significant impact on confidentiality and integrity, with no user interaction or authentication required. The vulnerability does not currently have known exploits in the wild, but its presence in critical industrial cloud infrastructure poses a substantial risk. The weakness stems from insufficient enforcement of MFA completion and session management during the initial setup phase, allowing session tokens to be issued prematurely or without proper verification. This can lead to unauthorized access, data exposure, and potential manipulation of industrial control data managed by the affected cloud platform.
Potential Impact
For European organizations, particularly those in manufacturing, industrial automation, and critical infrastructure sectors relying on FactoryTalk® DataMosaix™ Private Cloud, this vulnerability could lead to unauthorized access to sensitive operational data and control systems. Attackers exploiting this flaw could bypass MFA protections, potentially leading to data breaches, disruption of industrial processes, or manipulation of factory automation workflows. Given the role of Rockwell Automation products in European industrial environments, exploitation could undermine operational integrity and availability, causing financial losses and safety risks. The ability to obtain valid login tokens without passwords increases the risk of lateral movement within networks and persistent unauthorized access. This is especially critical for organizations with stringent regulatory compliance requirements such as GDPR and NIS Directive, where unauthorized access and data compromise can result in legal and reputational consequences.
Mitigation Recommendations
1. Enforce strict policies that require immediate completion of MFA setup upon enabling, disallowing any grace periods that permit incomplete MFA states. 2. Implement monitoring and alerting for accounts with incomplete MFA setup beyond a short threshold (preferably less than 7 days) to detect potential exploitation attempts. 3. Restrict network access to the FactoryTalk® DataMosaix™ Private Cloud management interfaces to trusted and segmented network zones, minimizing exposure to adjacent network attackers. 4. Apply vendor patches or updates as soon as they become available to address this vulnerability directly. 5. Conduct regular audits of session management and authentication flows to ensure tokens are only issued after successful MFA completion. 6. Employ additional compensating controls such as network-level MFA enforcement or VPN access restrictions to reduce attack surface. 7. Educate administrators and users about the importance of completing MFA setup promptly and reporting any anomalies.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Sweden
CVE-2025-11084: CWE-1390: Weak Authentication in Rockwell Automation FactoryTalk® DataMosaix™ Private Cloud
Description
A security issue exists within DataMosaix™ Private Cloud, allowing attackers to bypass MFA during setup and obtain a valid login-token cookie without knowing the users password. This vulnerability occurs when MFA is enabled but not completed within a 7-day period.
AI-Powered Analysis
Technical Analysis
CVE-2025-11084 is a vulnerability classified under CWE-1390 (Weak Authentication) affecting Rockwell Automation's FactoryTalk® DataMosaix™ Private Cloud versions 7.11, 8.00, and 8.01. The flaw arises during the MFA setup process: when MFA is enabled but not fully completed within a 7-day period, an attacker can bypass the MFA mechanism entirely. This bypass allows the attacker to obtain a valid login-token cookie without needing the user's password, effectively granting unauthorized access to the system. The vulnerability is exploitable remotely but requires adjacent network access, indicating that the attacker must be on the same local network or have similar network proximity. The CVSS 4.0 score is 7.6 (high severity), reflecting the significant impact on confidentiality and integrity, with no user interaction or authentication required. The vulnerability does not currently have known exploits in the wild, but its presence in critical industrial cloud infrastructure poses a substantial risk. The weakness stems from insufficient enforcement of MFA completion and session management during the initial setup phase, allowing session tokens to be issued prematurely or without proper verification. This can lead to unauthorized access, data exposure, and potential manipulation of industrial control data managed by the affected cloud platform.
Potential Impact
For European organizations, particularly those in manufacturing, industrial automation, and critical infrastructure sectors relying on FactoryTalk® DataMosaix™ Private Cloud, this vulnerability could lead to unauthorized access to sensitive operational data and control systems. Attackers exploiting this flaw could bypass MFA protections, potentially leading to data breaches, disruption of industrial processes, or manipulation of factory automation workflows. Given the role of Rockwell Automation products in European industrial environments, exploitation could undermine operational integrity and availability, causing financial losses and safety risks. The ability to obtain valid login tokens without passwords increases the risk of lateral movement within networks and persistent unauthorized access. This is especially critical for organizations with stringent regulatory compliance requirements such as GDPR and NIS Directive, where unauthorized access and data compromise can result in legal and reputational consequences.
Mitigation Recommendations
1. Enforce strict policies that require immediate completion of MFA setup upon enabling, disallowing any grace periods that permit incomplete MFA states. 2. Implement monitoring and alerting for accounts with incomplete MFA setup beyond a short threshold (preferably less than 7 days) to detect potential exploitation attempts. 3. Restrict network access to the FactoryTalk® DataMosaix™ Private Cloud management interfaces to trusted and segmented network zones, minimizing exposure to adjacent network attackers. 4. Apply vendor patches or updates as soon as they become available to address this vulnerability directly. 5. Conduct regular audits of session management and authentication flows to ensure tokens are only issued after successful MFA completion. 6. Employ additional compensating controls such as network-level MFA enforcement or VPN access restrictions to reduce attack surface. 7. Educate administrators and users about the importance of completing MFA setup promptly and reporting any anomalies.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Rockwell
- Date Reserved
- 2025-09-26T14:49:57.904Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69133f64e55e7c79b8ca8fee
Added to database: 11/11/2025, 1:51:32 PM
Last enriched: 11/11/2025, 2:06:38 PM
Last updated: 11/12/2025, 5:13:48 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12901: CWE-352 Cross-Site Request Forgery (CSRF) in asgaros Asgaros Forum
MediumCVE-2025-12833: CWE-639 Authorization Bypass Through User-Controlled Key in paoltaia GeoDirectory – WP Business Directory Plugin and Classified Listings Directory
MediumCVE-2025-12087: CWE-639 Authorization Bypass Through User-Controlled Key in acowebs Wishlist and Save for later for Woocommerce
MediumCVE-2025-54983: CWE-772 Missing Release of Resource after Effective Lifetime in Zscaler Zscaler Client Connector
MediumCVE-2025-43205: An app may be able to bypass ASLR in Apple watchOS
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.