Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11084: CWE-1390: Weak Authentication in Rockwell Automation FactoryTalk® DataMosaix™ Private Cloud

0
High
VulnerabilityCVE-2025-11084cvecve-2025-11084cwe-1390
Published: Tue Nov 11 2025 (11/11/2025, 13:26:05 UTC)
Source: CVE Database V5
Vendor/Project: Rockwell Automation
Product: FactoryTalk® DataMosaix™ Private Cloud

Description

A security issue exists within DataMosaix™ Private Cloud, allowing attackers to bypass MFA during setup and obtain a valid login-token cookie without knowing the users password. This vulnerability occurs when MFA is enabled but not completed within a 7-day period.

AI-Powered Analysis

AILast updated: 11/11/2025, 14:06:38 UTC

Technical Analysis

CVE-2025-11084 is a vulnerability classified under CWE-1390 (Weak Authentication) affecting Rockwell Automation's FactoryTalk® DataMosaix™ Private Cloud versions 7.11, 8.00, and 8.01. The flaw arises during the MFA setup process: when MFA is enabled but not fully completed within a 7-day period, an attacker can bypass the MFA mechanism entirely. This bypass allows the attacker to obtain a valid login-token cookie without needing the user's password, effectively granting unauthorized access to the system. The vulnerability is exploitable remotely but requires adjacent network access, indicating that the attacker must be on the same local network or have similar network proximity. The CVSS 4.0 score is 7.6 (high severity), reflecting the significant impact on confidentiality and integrity, with no user interaction or authentication required. The vulnerability does not currently have known exploits in the wild, but its presence in critical industrial cloud infrastructure poses a substantial risk. The weakness stems from insufficient enforcement of MFA completion and session management during the initial setup phase, allowing session tokens to be issued prematurely or without proper verification. This can lead to unauthorized access, data exposure, and potential manipulation of industrial control data managed by the affected cloud platform.

Potential Impact

For European organizations, particularly those in manufacturing, industrial automation, and critical infrastructure sectors relying on FactoryTalk® DataMosaix™ Private Cloud, this vulnerability could lead to unauthorized access to sensitive operational data and control systems. Attackers exploiting this flaw could bypass MFA protections, potentially leading to data breaches, disruption of industrial processes, or manipulation of factory automation workflows. Given the role of Rockwell Automation products in European industrial environments, exploitation could undermine operational integrity and availability, causing financial losses and safety risks. The ability to obtain valid login tokens without passwords increases the risk of lateral movement within networks and persistent unauthorized access. This is especially critical for organizations with stringent regulatory compliance requirements such as GDPR and NIS Directive, where unauthorized access and data compromise can result in legal and reputational consequences.

Mitigation Recommendations

1. Enforce strict policies that require immediate completion of MFA setup upon enabling, disallowing any grace periods that permit incomplete MFA states. 2. Implement monitoring and alerting for accounts with incomplete MFA setup beyond a short threshold (preferably less than 7 days) to detect potential exploitation attempts. 3. Restrict network access to the FactoryTalk® DataMosaix™ Private Cloud management interfaces to trusted and segmented network zones, minimizing exposure to adjacent network attackers. 4. Apply vendor patches or updates as soon as they become available to address this vulnerability directly. 5. Conduct regular audits of session management and authentication flows to ensure tokens are only issued after successful MFA completion. 6. Employ additional compensating controls such as network-level MFA enforcement or VPN access restrictions to reduce attack surface. 7. Educate administrators and users about the importance of completing MFA setup promptly and reporting any anomalies.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Rockwell
Date Reserved
2025-09-26T14:49:57.904Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69133f64e55e7c79b8ca8fee

Added to database: 11/11/2025, 1:51:32 PM

Last enriched: 11/11/2025, 2:06:38 PM

Last updated: 11/12/2025, 5:13:48 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats