Loading

FactoryTalk® DataMosaix™ Private Cloud – Multiple Vulnerabilities

Severity:
High
Advisory ID:
SD1758
Data pubblicazione:
November 11, 2025
Ultimo aggiornamento:
November 11, 2025
Revision Number:
1.0
Known Exploited Vulnerability (KEV):
No
Corrected:
Sì
Workaround:
No
CVE IDs
CVE-2025-11084,
CVE-2025-11085
Download
The following link(s) provide the security advisory in Vulnerability Exploitability Exchange format:
JSON
JSON
Riepilogo

The security of our products is important to us as your industrial automation supplier. This security issue was found internally during routine testing and is being reported based on our commitment to customer transparency and improvement of all business environments.

Product Description

FactoryTalk® DataMosaix™ Private Cloud is a customer-managed deployment of Rockwell’s Industrial DataOps platform that enables scalable, contextualized access to OT and IT data across the enterprise, making it meaningful and useful through built-in use cases, visualization tools, open APIs, and connectors to industry-standard analytics platforms.

Affected Products and Solution

Affected Product

CVE

Affected Software Version

Corrected in Software Version

FactoryTalk® DataMosaix™ Private Cloud

CVE-2025-11084

7.11, 8.00, 8.01

8.02

FactoryTalk® DataMosaix™ Private Cloud

CVE-2025-11085

 

7.11, 8.00

8.01

Security Issue Details for CVE-2025-11084

Category

Details

CVE ID

CVE-2025-11084

Impact

A security issue exists within DataMosaix™ Private Cloud, allowing attackers to bypass MFA during setup and obtain a valid login-token cookie without knowing the users password. This vulnerability occurs when MFA is enabled but not completed within a 7-day period.

CVSS 3.1 Base Score

6.8/10

CVSS 4.0 Base Score

7.6/10

CWE

CWE-1390: Weak Authentication

Known Exploited Vulnerability

No (Not listed in KEV database)

 

Security Issue Details for CVE-2025-11085

Category

Details

CVE ID

CVE-2025-11085

Impact

A security issue exists within DataMosaix™ Private Cloud allowing for Persistent XSS. This vulnerability can result in the execution of malicious JavaScript, allowing for account takeover, credential theft, or redirection to a malicious website.

CVSS 3.1 Base Score

8.0/10

CVSS 4.0 Base Score

8.7/10

CWE

CWE-116: Improper Encoding or Escaping of Output

Known Exploited Vulnerability

No (Not listed in KEV database)

 

Mitigations and Workarounds
Customers using the affected software, who are not able to upgrade to one of the corrected versions, should use our security best practices. 

Revision History

Revision

Date

Description

1.0

November 11, 2025

Initial release

Glossary:

·         MFA: (multi-factor authentication) security process that requires users to verify their identity using two or more distinct authentication factors before gaining access to a system or application

·         XSS:  a web security vulnerability that allows an attacker to inject malicious scripts into content from otherwise trusted websites

·         JavaScript: high-level, interpreted programming language primarily used to create interactive and dynamic content on websites.

 

Get Up-to-Date Product Security Information

Visit the Rockwell Automation security advisories on the Trust Center page to:

·         Subscribe to product security alerts

·         Review the current list of Rockwell Automation security advisories

·         Report a possible security issue in a Rockwell Automation product

·         Learn more about the vulnerability policy

Support

If you have any questions regarding the security issue(s) above and how to mitigate them, contact TechConnect for help. More information can be found at Contact Us | Rockwell Automation | US.

If you have any questions regarding this disclosure, please contact PSIRT
Email: rasecure@ra.rockwell.com

Legal Disclaimer

ROCKWELL AUTOMATION DOES NOT WARRANT THE COMPLETENESS, TIMELINESS OR ACCURACY OF ANY OF THE DATA CONTAINED IN THIS WEB SITE AND MAY MAKE CHANGES THERETO AT ANY TIME IN ITS SOLE DISCRETION WITHOUT NOTICE. FURTHER, ALL INFORMATION CONVEYED HEREBY IS PROVIDED TO USERS "AS IS." IN NO EVENT SHALL ROCKWELL BE LIABLE FOR ANY DAMAGES OF ANY KIND INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS PROFIT OR DAMAGE, EVEN IF ROCKWELL AUTOMATION HAVE BEEN ADVISED ON THE POSSIBILITY OF SUCH DAMAGES. ROCKWELL AUTOMATION DISCLAIMS ALL WARRANTIES WHETHER EXPRESSED OR IMPLIED IN RESPECT OF THE INFORMATION (INCLUDING SOFTWARE) PROVIDED HEREBY, INCLUDING THE IMPLIED WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, AND NON-INFRINGEMENT. Note that certain jurisdictions do not countenance the exclusion of implied warranties; thus, this disclaimer may not apply to you.

Rockwell Automation Home
Copyright ©2022 Rockwell Automation, Inc.
  1. Chevron LeftChevron Left Home Rockwell Automation
  2. Chevron LeftChevron Left Trust Center
  3. Chevron LeftChevron Left Industrial Security Adv
  4. Chevron LeftChevron Left Industrial Security Advisory Detail
Aggiorna le tue preferenze sui cookie per continuare.
Questa funzionalità richiede i cookie per migliorare la tua esperienza. Ti preghiamo di aggiornare le tue preferenze per consentire questi cookie:
  • Cookie dei social media
  • Cookie funzionali
  • Cookie di prestazione
  • Cookie di marketing
  • Tutti i cookie
Puoi aggiornare le tue preferenze in qualsiasi momento. Per ulteriori informazioni consultare il nostro {0} politica sulla riservatezza
CloseClose