CVE-2025-11084: CWE-1390: Weak Authentication in Rockwell Automation FactoryTalk® DataMosaix™ Private Cloud
A security issue exists within DataMosaix™ Private Cloud, allowing attackers to bypass MFA during setup and obtain a valid login-token cookie without knowing the users password. This vulnerability occurs when MFA is enabled but not completed within a 7-day period.
AI Analysis
Technical Summary
CVE-2025-11084 is a security vulnerability classified under CWE-1390, indicating weak authentication mechanisms within Rockwell Automation's FactoryTalk® DataMosaix™ Private Cloud software. The vulnerability specifically arises during the MFA setup process. When MFA is enabled but not fully completed within a 7-day timeframe, the system fails to enforce MFA properly, allowing an attacker to bypass it. This bypass enables the attacker to obtain a valid login-token cookie without knowledge of the user's password, granting unauthorized access to the system. The affected versions include 7.11, 8.00, and 8.01. The CVSS 4.0 score is 7.6, reflecting high severity with an attack vector that is adjacent network (AV:A), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality and integrity (VC:H, VI:H). The vulnerability does not require authentication or user interaction, but the attacker must have network access to the affected system. No patches are currently listed, and no exploits have been observed in the wild. This vulnerability is critical for environments relying on FactoryTalk® DataMosaix™ Private Cloud for industrial automation data management, as unauthorized access could lead to data breaches and operational interference.
Potential Impact
For European organizations, particularly those in manufacturing, industrial automation, and critical infrastructure sectors that rely on Rockwell Automation's FactoryTalk® DataMosaix™ Private Cloud, this vulnerability poses a significant risk. Unauthorized access through MFA bypass can lead to exposure of sensitive operational data, intellectual property theft, and potential manipulation of industrial processes. This could result in operational downtime, financial losses, and damage to reputation. The ability to obtain a valid login token without a password undermines trust in the authentication system and may facilitate further lateral movement within the network. Given the high adoption of Rockwell Automation products in European industrial hubs, the impact could be widespread. Additionally, regulatory compliance issues may arise if personal or sensitive data is compromised, leading to potential fines under GDPR. The lack of known exploits currently provides a window for proactive mitigation, but the high severity score indicates that exploitation could have serious consequences.
Mitigation Recommendations
1. Enforce strict policies requiring MFA setup completion within a shorter timeframe than 7 days or disable accounts that do not complete MFA setup promptly. 2. Implement continuous monitoring and alerting for incomplete MFA setups and unusual token issuance activities. 3. Restrict network access to FactoryTalk® DataMosaix™ Private Cloud management interfaces to trusted IP ranges and use network segmentation to limit exposure. 4. Apply vendor patches immediately once available; engage with Rockwell Automation support to obtain updates or workarounds. 5. Conduct regular audits of authentication logs to detect anomalous login-token issuance or usage patterns. 6. Educate administrators and users about the importance of completing MFA setup promptly and securely. 7. Consider deploying additional compensating controls such as Web Application Firewalls (WAF) to detect and block suspicious authentication bypass attempts. 8. Integrate threat intelligence feeds to stay informed about emerging exploits targeting this vulnerability. 9. Review and harden overall identity and access management policies surrounding the affected product. 10. Prepare incident response plans specifically addressing potential unauthorized access scenarios related to this vulnerability.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Sweden
CVE-2025-11084: CWE-1390: Weak Authentication in Rockwell Automation FactoryTalk® DataMosaix™ Private Cloud
Description
A security issue exists within DataMosaix™ Private Cloud, allowing attackers to bypass MFA during setup and obtain a valid login-token cookie without knowing the users password. This vulnerability occurs when MFA is enabled but not completed within a 7-day period.
AI-Powered Analysis
Technical Analysis
CVE-2025-11084 is a security vulnerability classified under CWE-1390, indicating weak authentication mechanisms within Rockwell Automation's FactoryTalk® DataMosaix™ Private Cloud software. The vulnerability specifically arises during the MFA setup process. When MFA is enabled but not fully completed within a 7-day timeframe, the system fails to enforce MFA properly, allowing an attacker to bypass it. This bypass enables the attacker to obtain a valid login-token cookie without knowledge of the user's password, granting unauthorized access to the system. The affected versions include 7.11, 8.00, and 8.01. The CVSS 4.0 score is 7.6, reflecting high severity with an attack vector that is adjacent network (AV:A), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality and integrity (VC:H, VI:H). The vulnerability does not require authentication or user interaction, but the attacker must have network access to the affected system. No patches are currently listed, and no exploits have been observed in the wild. This vulnerability is critical for environments relying on FactoryTalk® DataMosaix™ Private Cloud for industrial automation data management, as unauthorized access could lead to data breaches and operational interference.
Potential Impact
For European organizations, particularly those in manufacturing, industrial automation, and critical infrastructure sectors that rely on Rockwell Automation's FactoryTalk® DataMosaix™ Private Cloud, this vulnerability poses a significant risk. Unauthorized access through MFA bypass can lead to exposure of sensitive operational data, intellectual property theft, and potential manipulation of industrial processes. This could result in operational downtime, financial losses, and damage to reputation. The ability to obtain a valid login token without a password undermines trust in the authentication system and may facilitate further lateral movement within the network. Given the high adoption of Rockwell Automation products in European industrial hubs, the impact could be widespread. Additionally, regulatory compliance issues may arise if personal or sensitive data is compromised, leading to potential fines under GDPR. The lack of known exploits currently provides a window for proactive mitigation, but the high severity score indicates that exploitation could have serious consequences.
Mitigation Recommendations
1. Enforce strict policies requiring MFA setup completion within a shorter timeframe than 7 days or disable accounts that do not complete MFA setup promptly. 2. Implement continuous monitoring and alerting for incomplete MFA setups and unusual token issuance activities. 3. Restrict network access to FactoryTalk® DataMosaix™ Private Cloud management interfaces to trusted IP ranges and use network segmentation to limit exposure. 4. Apply vendor patches immediately once available; engage with Rockwell Automation support to obtain updates or workarounds. 5. Conduct regular audits of authentication logs to detect anomalous login-token issuance or usage patterns. 6. Educate administrators and users about the importance of completing MFA setup promptly and securely. 7. Consider deploying additional compensating controls such as Web Application Firewalls (WAF) to detect and block suspicious authentication bypass attempts. 8. Integrate threat intelligence feeds to stay informed about emerging exploits targeting this vulnerability. 9. Review and harden overall identity and access management policies surrounding the affected product. 10. Prepare incident response plans specifically addressing potential unauthorized access scenarios related to this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Rockwell
- Date Reserved
- 2025-09-26T14:49:57.904Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69133f64e55e7c79b8ca8fee
Added to database: 11/11/2025, 1:51:32 PM
Last enriched: 11/18/2025, 2:34:35 PM
Last updated: 12/27/2025, 10:17:02 AM
Views: 99
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15105: Use of Hard-coded Cryptographic Key in getmaxun maxun
MediumNew MongoDB Flaw Lets Unauthenticated Attackers Read Uninitialized Memory
HighCVE-2025-68952: CWE-94: Improper Control of Generation of Code ('Code Injection') in eigent-ai eigent
CriticalCVE-2025-68948: CWE-321: Use of Hard-coded Cryptographic Key in siyuan-note siyuan
MediumCVE-2025-68927: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in abhinavxd libredesk
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.