Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12807: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Rockwell Automation FactoryTalk® DataMosaix™ Private Cloud

0
High
VulnerabilityCVE-2025-12807cvecve-2025-12807cwe-89
Published: Tue Dec 09 2025 (12/09/2025, 13:56:32 UTC)
Source: CVE Database V5
Vendor/Project: Rockwell Automation
Product: FactoryTalk® DataMosaix™ Private Cloud

Description

A security issue was discovered in DataMosaix Private Cloud, allowing users with low privilege to perform sensitive database operations through exposed API endpoints.

AI-Powered Analysis

AILast updated: 12/16/2025, 14:27:37 UTC

Technical Analysis

CVE-2025-12807 is a SQL Injection vulnerability classified under CWE-89 affecting Rockwell Automation's FactoryTalk® DataMosaix™ Private Cloud software versions 7.11, 8.00, and 8.01. This vulnerability arises from improper neutralization of special elements in SQL commands, allowing malicious input to alter database queries executed by the application. The flaw is exploitable by users with low privileges through exposed API endpoints, which do not require authentication or user interaction, significantly lowering the barrier for exploitation. Successful exploitation can lead to unauthorized execution of sensitive database operations, including data exfiltration, modification, or deletion, severely impacting confidentiality, integrity, and availability of the system's data. The vulnerability is network exploitable (AV:N), requires low attack complexity (AC:L), no privileges (PR:L), and no user interaction (UI:N), with high impact on confidentiality, integrity, and availability (all rated high). Although no known exploits are currently reported in the wild, the critical nature of the affected software—used in industrial automation and manufacturing environments—makes this a significant threat. The exposed API endpoints represent a critical attack surface, and the vulnerability could be leveraged to disrupt industrial processes or steal sensitive operational data. The absence of available patches at the time of publication necessitates immediate defensive measures to mitigate risk.

Potential Impact

For European organizations, particularly those in manufacturing, industrial automation, and critical infrastructure sectors, this vulnerability poses a severe risk. FactoryTalk® DataMosaix™ Private Cloud is widely used for data aggregation and analysis in industrial environments, meaning exploitation could lead to unauthorized access to sensitive operational data, manipulation of control systems, and disruption of manufacturing processes. This could result in operational downtime, financial losses, regulatory non-compliance, and damage to reputation. The ability for low-privilege users to exploit the vulnerability increases the risk of insider threats or lateral movement by attackers who have gained limited access. The potential for data integrity compromise could lead to incorrect operational decisions, safety hazards, or cascading failures in industrial control systems. Given the interconnected nature of European industrial networks, a successful attack could propagate beyond a single organization, affecting supply chains and critical infrastructure resilience.

Mitigation Recommendations

1. Immediately restrict access to FactoryTalk® DataMosaix™ Private Cloud API endpoints to trusted networks and authenticated users only, using network segmentation and firewall rules. 2. Implement strict input validation and sanitization on all API inputs to prevent injection of malicious SQL commands. 3. Monitor API usage logs for anomalous or unexpected database operations indicative of exploitation attempts. 4. Employ application-layer firewalls or Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the affected endpoints. 5. Coordinate with Rockwell Automation for timely receipt and deployment of security patches as soon as they become available. 6. Conduct thorough security audits and penetration testing focused on API security and database interaction layers. 7. Educate and train internal users and administrators on the risks of low-privilege exploitation and enforce the principle of least privilege rigorously. 8. Prepare incident response plans tailored to potential industrial control system compromises to minimize impact in case of exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Rockwell
Date Reserved
2025-11-06T15:11:09.550Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69382bbdabbdc4595cd8b6bd

Added to database: 12/9/2025, 2:01:33 PM

Last enriched: 12/16/2025, 2:27:37 PM

Last updated: 2/8/2026, 1:46:24 AM

Views: 167

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats