Executive Summary
In January 2026, Rockwell Automation disclosed a critical vulnerability in its FactoryTalk DataMosaix Private Cloud platform affecting versions 7.11, 8.00, and 8.01. Identified as CVE-2025-12807, this SQL Injection flaw allows low-privilege users to execute unauthorized sensitive database operations through exposed API endpoints. While no public exploitation has been reported, successful attacks could significantly compromise critical manufacturing infrastructure worldwide by enabling attackers to access or manipulate sensitive industrial data.
The incident highlights ongoing risks to industrial control environments from common vulnerabilities like SQL Injection, especially in products globally deployed across critical infrastructure sectors. With attackers increasingly targeting OT platforms, organizations face renewed urgency to review security controls and ensure compliance with updated defensive best practices.
Why This Matters Now
This vulnerability underscores the persistent threat posed by insecure APIs and common web application flaws in industrial control systems. Given the global reach of Rockwell’s platform and its use in critical manufacturing operations, the urgency lies in applying patches and rigorously reviewing network exposure to prevent potentially devastating impacts.
Attack Path Analysis
An attacker exploited an exposed API endpoint within FactoryTalk DataMosaix Private Cloud, leveraging a SQL injection (CVE-2025-12807) to conduct unauthorized database operations. With increased privileges, the adversary gained deeper access, potentially expanding reach within the environment. Using available east-west connectivity, the attacker moved laterally to compromise additional systems or workloads. They established command and control by initiating outbound connections, possibly via covert or unfiltered channels. Sensitive data was exfiltrated through allowed egress paths. Finally, the attacker could impact the business by manipulating or destroying critical data.
Kill Chain Progression
Initial Compromise
Description
Attacker exploited an unprotected API endpoint vulnerable to SQL injection, gaining initial unauthorized access to the system.
Related CVEs
CVE-2025-12807
CVSS 8.8A security issue in DataMosaix Private Cloud allows low-privilege users to perform sensitive database operations through exposed API endpoints.
Affected Products:
Rockwell Automation FactoryTalk DataMosaix Private Cloud – 7.11, 8.00, 8.01
Exploit Status:
no public exploitCVE-2025-11084
CVSS 6.8A vulnerability in DataMosaix Private Cloud allows attackers to bypass MFA during setup and obtain a valid login-token cookie without knowing the user's password.
Affected Products:
Rockwell Automation FactoryTalk DataMosaix Private Cloud – 7.11, 8.00, 8.01
Exploit Status:
no public exploitCVE-2025-11085
CVSS 8A persistent XSS vulnerability in DataMosaix Private Cloud allows execution of malicious JavaScript, leading to account takeover, credential theft, or redirection to malicious websites.
Affected Products:
Rockwell Automation FactoryTalk DataMosaix Private Cloud – 7.11, 8.00
Exploit Status:
no public exploit
MITRE ATT&CK® Techniques
Techniques map to plausible tactics/techniques for SQLi-enabled unauthorized database operations. Expanded enrichment available with STIX/TAXII integration.
Exploit Public-Facing Application
Server Software Component: Web Shell
Command and Scripting Interpreter: Visual Basic
Network Sniffing
Application Layer Protocol: Web Protocols
Data Manipulation: Stored Data Manipulation
Phishing: Spearphishing Attachment
Data Obfuscation
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS v4.0 – Protect public-facing web applications against attacks
Control ID: 6.4.3
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA (Regulation (EU) 2022/2554) – ICT Systems and Protocols Security
Control ID: Art. 9(2)
CISA ZTMM 2.0 – Application Vulnerability Management
Control ID: Application/Workload Pillar – Control 7
NIS2 Directive – Security of Network and Information Systems
Control ID: Article 21(2)(d)
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Industrial Automation
Critical Manufacturing sector faces severe SQL injection vulnerability in Rockwell FactoryTalk DataMosaix, enabling unauthorized database operations compromising industrial control systems and operational technology security.
Automotive
Manufacturing operations using FactoryTalk DataMosaix Private Cloud vulnerable to privilege escalation attacks, potentially disrupting production lines and compromising sensitive manufacturing data through exposed API endpoints.
Oil/Energy/Solar/Greentech
Energy sector critical infrastructure at risk from high-severity SQL injection allowing low-privilege users to perform unauthorized database operations, threatening operational continuity and regulatory compliance.
Food Production
Food manufacturing facilities utilizing Rockwell automation systems face database compromise risks through CVE-2025-12807, potentially affecting production scheduling, quality control, and safety monitoring systems.
Sources
- Rockwell Automation FactoryTalk DataMosaix Private Cloudhttps://www.cisa.gov/news-events/ics-advisories/icsa-26-013-02Verified
- SD1765 | Security Advisory | Rockwell Automationhttps://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1765.htmlVerified
- SD1758 | Security Advisory | Rockwell Automationhttps://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1758.htmlVerified
- NVD - CVE-2025-12807https://nvd.nist.gov/vuln/detail/CVE-2025-12807Verified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Zero Trust segmentation, robust east-west controls, continuous threat detection, and strict egress policies could have limited the attacker's ability to exploit, move within, and exfiltrate from the FactoryTalk DataMosaix Cloud. CNSF controls—especially with granular policy enforcement and continuous anomaly detection—addressed key kill chain points to reduce blast radius and exposure.
Control: Cloud Firewall (ACF)
Mitigation: Blocked unauthorized access attempts to exposed API endpoints.
Control: Threat Detection & Anomaly Response
Mitigation: Detected abnormal database access or privilege changes.
Control: Zero Trust Segmentation
Mitigation: Contained movement by enforcing strict identity-based segmentation.
Control: Egress Security & Policy Enforcement
Mitigation: Blocked unauthorized outbound connections to attacker infrastructure.
Control: Egress Security & Policy Enforcement
Mitigation: Detected or prevented unauthorized exfiltration of sensitive data.
Detected destructive actions against cloud databases.
Impact at a Glance
Affected Business Functions
- Data Management
- Analytics
- Reporting
Estimated downtime: 3 days
Estimated loss: $50,000
Potential exposure of sensitive operational data due to unauthorized database operations.
Recommended Actions
Key Takeaways & Next Steps
- • Enforce Zero Trust segmentation and microsegmentation on all cloud workloads and APIs to minimize initial compromise vectors.
- • Implement centralized cloud firewall and strict egress policy enforcement to block unauthorized inbound and outbound access.
- • Deploy continuous threat detection and anomaly response to rapidly identify privilege escalation, lateral movement, and exfiltration attempts.
- • Ensure all east-west traffic is subject to workload identity inspection and allow-only principles using distributed policy engines.
- • Regularly review and remediate cloud API exposures, patch known vulnerabilities (like CVE-2025-12807), and baseline sensitive operations for deviations.

