Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12807: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Rockwell Automation FactoryTalk® DataMosaix™ Private Cloud

0
High
VulnerabilityCVE-2025-12807cvecve-2025-12807cwe-89
Published: Tue Dec 09 2025 (12/09/2025, 13:56:32 UTC)
Source: CVE Database V5
Vendor/Project: Rockwell Automation
Product: FactoryTalk® DataMosaix™ Private Cloud

Description

A security issue was discovered in DataMosaix Private Cloud, allowing users with low privilege to perform sensitive database operations through exposed API endpoints.

AI-Powered Analysis

AILast updated: 12/09/2025, 14:05:53 UTC

Technical Analysis

CVE-2025-12807 is a SQL Injection vulnerability identified in Rockwell Automation's FactoryTalk® DataMosaix™ Private Cloud software, specifically affecting versions 7.11, 8.00, and 8.01. The flaw arises from improper neutralization of special characters in SQL commands (classified as CWE-89), allowing attackers with low privileges to exploit exposed API endpoints to execute unauthorized and sensitive database operations. The vulnerability does not require user interaction or elevated privileges beyond low-level access, and it can be exploited remotely over the network (CVSS vector: AV:N/AC:L/PR:L/UI:N). The impact on confidentiality, integrity, and availability is high, as attackers can potentially read, modify, or delete critical data stored in backend databases. Although no known exploits have been reported in the wild yet, the ease of exploitation and the critical nature of the affected systems make this a significant threat. FactoryTalk DataMosaix Private Cloud is widely used in industrial automation environments to collect, store, and analyze operational data, making this vulnerability particularly concerning for industrial control systems (ICS) and critical infrastructure. The lack of available patches at the time of disclosure necessitates immediate mitigation through access control and monitoring. The vulnerability was officially published on December 9, 2025, and was reserved a month earlier, indicating a recent discovery and disclosure cycle.

Potential Impact

For European organizations, especially those in manufacturing, energy, utilities, and critical infrastructure sectors relying on Rockwell Automation's FactoryTalk DataMosaix Private Cloud, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to sensitive operational data, manipulation or corruption of industrial process data, disruption of services, and potential cascading effects on industrial control systems. Given the integration of such systems in critical infrastructure, impacts could extend to operational downtime, safety hazards, and regulatory non-compliance. The high CVSS score (8.7) reflects the severe potential consequences and ease of exploitation. Organizations with interconnected IT and OT environments face increased risk of lateral movement and broader compromise. The vulnerability's exploitation could also undermine trust in industrial data integrity, affecting decision-making and operational efficiency.

Mitigation Recommendations

1. Immediately restrict access to FactoryTalk DataMosaix Private Cloud API endpoints by implementing network segmentation and firewall rules to limit exposure to trusted hosts only. 2. Enforce strict authentication and authorization controls on API usage, ensuring that only necessary users and systems have access, and monitor for anomalous access patterns. 3. Implement input validation and sanitization at the application layer where possible to mitigate injection risks until official patches are released. 4. Monitor database query logs and API request logs for unusual or suspicious activity indicative of SQL injection attempts. 5. Coordinate with Rockwell Automation for timely receipt and deployment of security patches once available. 6. Conduct security assessments and penetration testing focused on API endpoints to identify and remediate similar vulnerabilities. 7. Educate operational technology (OT) and IT security teams about the risks and detection methods related to SQL injection in industrial environments. 8. Develop and test incident response plans specific to industrial control system compromises to minimize impact in case of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Rockwell
Date Reserved
2025-11-06T15:11:09.550Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69382bbdabbdc4595cd8b6bd

Added to database: 12/9/2025, 2:01:33 PM

Last enriched: 12/9/2025, 2:05:53 PM

Last updated: 12/11/2025, 6:58:51 AM

Views: 77

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats