FactoryTalk DataMosaix: How a Cloud Misstep Could Turn into a Rainstorm of Security Risks!
View CSAF: Rockwell Automation’s FactoryTalk DataMosaix Private Cloud is navigating choppy cybersecurity waters. With remote exploitability and low attack complexity, vulnerabilities are as welcome as a seagull at a picnic. The fix? Update your software and keep attackers at bay—or risk your cloud turning into a hacker’s playground.

Hot Take:
Looks like FactoryTalk DataMosaix Private Cloud just turned into FactoryTalk DataMo-Snafu! With a vulnerability as complex as a soap opera plot twist, attackers can waltz right in and take over like they own the place. Maybe Rockwell Automation should consider renaming it to FactoryTalk DataMo-SaveMe. It’s a good thing they have a patch ready—because who doesn’t love a good software makeover?
Key Points:
- Rockwell Automation’s FactoryTalk DataMosaix Private Cloud has vulnerabilities that allow attackers to exploit weak authentication and improper output encoding.
- Two major vulnerabilities (CVE-2025-11084 and CVE-2025-11085) pose a risk of account takeover, credential theft, and malicious website redirection.
- Successful exploitation could result in bypassing multi-factor authentication or executing persistent cross-site scripting attacks.
- Rockwell Automation recommends updating to the latest software version to mitigate these vulnerabilities.
- CISA provides guidelines for safeguarding against potential exploitation, including network exposure minimization and employing VPNs.
Already a member? Log in here
