CVE-2025-11084

N/A Unknown

📋 TL;DR

A vulnerability in DataMosaix Private Cloud allows attackers to bypass multi-factor authentication during setup and obtain valid login tokens without knowing user passwords. This occurs when MFA is enabled but not completed within 7 days. All DataMosaix Private Cloud deployments with MFA enabled are affected.

💻 Affected Systems

Products:
  • DataMosaix Private Cloud
Versions: All versions prior to the fix
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where MFA is enabled but not completed within 7 days during initial setup.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain unauthorized administrative access to the entire DataMosaix Private Cloud environment, potentially compromising sensitive industrial data and control systems.

🟠

Likely Case

Attackers gain unauthorized access to user accounts, potentially leading to data theft, privilege escalation, or lateral movement within the network.

🟢

If Mitigated

With proper monitoring and access controls, impact is limited to specific compromised accounts that can be quickly identified and disabled.

🌐 Internet-Facing: HIGH - If the DataMosaix Private Cloud is exposed to the internet, attackers can exploit this remotely without authentication.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this vulnerability to escalate privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires no authentication and minimal technical skill once the vulnerability is understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Rockwell Automation advisory for specific patched versions

Vendor Advisory: https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1758.html

Restart Required: Yes

Instructions:

1. Review the Rockwell Automation security advisory SD1758. 2. Apply the recommended patch or update to the latest version. 3. Restart the DataMosaix Private Cloud service. 4. Verify MFA setup completion for all users.

🔧 Temporary Workarounds

Force MFA Completion

all

Require all users to complete MFA setup immediately and disable accounts with incomplete MFA

Reduce MFA Setup Window

all

Change MFA setup timeout from 7 days to a much shorter period (e.g., 24 hours)

🧯 If You Can't Patch

  • Monitor for login attempts from accounts with incomplete MFA setup
  • Implement network segmentation to limit access to DataMosaix Private Cloud

🔍 How to Verify

Check if Vulnerable:

Check if any user accounts have MFA enabled but not completed for more than 7 days

Check Version:

Check DataMosaix Private Cloud administration interface for version information

Verify Fix Applied:

Verify that MFA setup timeout has been reduced and all users have completed MFA enrollment

📡 Detection & Monitoring

Log Indicators:

  • Login attempts from accounts with incomplete MFA setup
  • Successful logins without MFA completion

Network Indicators:

  • Unauthenticated requests to MFA setup endpoints
  • Unusual authentication patterns

SIEM Query:

source="datamosaix" AND (event="login" AND mfa_status="incomplete")

🔗 References

📤 Share & Export