Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14376: CWE-922: Insecure Storage of Sensitive Information in Rockwell Automation Verve Asset Manager

0
High
VulnerabilityCVE-2025-14376cvecve-2025-14376cwe-922
Published: Tue Jan 20 2026 (01/20/2026, 13:18:32 UTC)
Source: CVE Database V5
Vendor/Project: Rockwell Automation
Product: Verve Asset Manager

Description

A security issue was discovered within the legacy ADI server component of Verve Asset Manager, caused by plaintext secrets stored in environment variables on the ADI server. This component has been retired and has been optional since the 1.36 release in 2024.

AI-Powered Analysis

AILast updated: 01/20/2026, 14:05:40 UTC

Technical Analysis

CVE-2025-14376 identifies a critical security flaw in the legacy ADI server component of Rockwell Automation's Verve Asset Manager. The vulnerability is due to the insecure storage of sensitive information—specifically plaintext secrets—in environment variables on the ADI server. Environment variables are often accessible to processes and users with sufficient privileges, and storing secrets in plaintext significantly increases the risk of unauthorized disclosure. The ADI server component has been deprecated and made optional since version 1.36 released in 2024, but versions from 1.33 through 1.41.3 remain affected. The vulnerability requires an attacker to have local access with high privileges (PR:H) and partial authentication (AT:P), but does not require user interaction (UI:N). The CVSS 4.0 vector indicates a local attack vector (AV:L), low attack complexity (AC:L), and high impact on confidentiality, integrity, and availability (all high). This means an attacker with sufficient privileges could extract sensitive secrets, potentially leading to further compromise of the asset manager or connected systems. No public exploits are known yet, but the high severity score reflects the potential damage. The affected product is widely used in industrial environments for asset management, making the vulnerability particularly concerning for operational technology (OT) environments where confidentiality and integrity are critical. The lack of official patches suggests that mitigation relies on configuration changes, component removal, or upgrades to versions that do not include the legacy ADI server.

Potential Impact

The impact on European organizations could be significant, especially those in manufacturing, energy, and critical infrastructure sectors that rely on Rockwell Automation's Verve Asset Manager for asset tracking and management. Exposure of plaintext secrets could allow attackers to escalate privileges, move laterally within networks, or disrupt asset management operations, potentially leading to operational downtime or safety risks. Confidentiality breaches could expose sensitive operational data or credentials, while integrity compromises could allow manipulation of asset information, undermining trust in the system. Availability impacts could arise if attackers leverage the vulnerability to disrupt services. Given the high CVSS score and the critical role of asset management in industrial environments, the vulnerability poses a substantial risk to European OT environments. Organizations using affected versions without mitigation are at risk of targeted attacks, especially in sectors with high automation adoption.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first identify any deployments of Verve Asset Manager versions 1.33 through 1.41.3 that include the legacy ADI server component. Since the component is optional and retired since version 1.36, organizations should disable or remove the legacy ADI server entirely. If removal is not immediately feasible, restrict access to the environment variables on the ADI server by enforcing strict file system permissions and limiting administrative access. Implement environment variable encryption or secret management solutions to avoid plaintext storage of sensitive data. Upgrade to the latest versions of Verve Asset Manager that do not include the legacy ADI server or have addressed this issue. Additionally, conduct regular audits of environment variables and credentials stored on servers. Network segmentation and monitoring for unusual local access attempts can further reduce risk. Finally, train administrators on secure handling of secrets and environment variables to prevent recurrence.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Rockwell
Date Reserved
2025-12-09T19:01:48.764Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696f88404623b1157c37542a

Added to database: 1/20/2026, 1:50:56 PM

Last enriched: 1/20/2026, 2:05:40 PM

Last updated: 1/20/2026, 5:28:17 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats