Critical SQL Injection Flaw in Rockwell Automation FactoryTalk DataMosaix

Rockwell Automation has disclosed a **critical SQL injection vulnerability (CVE-2025-12807)** in its FactoryTalk DataMosaix Private Cloud software. If exploited, this flaw could allow attackers with low privileges to perform unauthorized sensitive database operations. Users are urged to update to **Version 8.01.02 or later** immediately to mitigate risks.

---
title: "Critical SQL Injection Flaw in Rockwell Automation FactoryTalk DataMosaix"
short_title: "Rockwell Automation FactoryTalk SQL injection flaw"
description: "Rockwell Automation patches critical SQL injection vulnerability (CVE-2025-12807) in FactoryTalk DataMosaix Private Cloud. Learn how to mitigate risks and secure your systems."
author: "Vitus"
date: 2025-01-24
categories: [Cybersecurity, Vulnerabilities]
tags: [rockwell automation, cve-2025-12807, sql injection, critical manufacturing, ot security]
score: 0.85
cve_ids: [CVE-2025-12807]
---

TL;DR


Rockwell Automation has disclosed a critical SQL injection vulnerability (CVE-2025-12807) in its FactoryTalk DataMosaix Private Cloud software. If exploited, this flaw could allow attackers with low privileges to perform unauthorized sensitive database operations. Users are urged to update to Version 8.01.02 or later immediately to mitigate risks.

---

Main Content

Introduction


Rockwell Automation, a global leader in industrial automation and digital transformation, has issued an urgent advisory addressing a critical SQL injection vulnerability in its FactoryTalk DataMosaix Private Cloud software. Tracked as CVE-2025-12807, this flaw poses a significant risk to organizations in the critical manufacturing sector, potentially allowing attackers to execute unauthorized database operations. With a CVSS score of 8.8, this vulnerability demands immediate attention from security teams and industrial operators worldwide.

---

Key Points


- Vulnerability Impact: Successful exploitation could enable attackers with low privileges to perform sensitive database operations via exposed API endpoints.
- Affected Versions: FactoryTalk DataMosaix Private Cloud Versions 7.11, 8.00, and 8.01 are confirmed to be vulnerable.
- Severity: The flaw has been assigned a CVSS v3.1 base score of 8.8 (High), reflecting its potential for significant damage.
- Mitigation: Rockwell Automation has released Version 8.01.02 to patch the vulnerability. Users unable to upgrade should follow best security practices to reduce risks.
- Deployment Scope: The software is deployed worldwide, primarily in critical manufacturing environments.

---

Technical Details


#### Vulnerability Overview
CVE-2025-12807 is classified as an Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) vulnerability. This type of flaw occurs when an application fails to properly sanitize user-supplied input, allowing attackers to manipulate SQL queries. In this case, the vulnerability exists in exposed API endpoints of the FactoryTalk DataMosaix Private Cloud, enabling low-privilege users to execute unauthorized database operations.

#### CVSS Metrics
The vulnerability has been scored using CVSS v3.1 with the following metrics:
- Base Score: 8.8 (High)
- Vector String: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
- Attack Vector (AV): Network (exploitable remotely)
- Attack Complexity (AC): Low
- Privileges Required (PR): Low
- User Interaction (UI): None
- Scope (S): Unchanged
- Confidentiality (C): High
- Integrity (I): High
- Availability (A): High

#### Affected Systems
The following versions of Rockwell Automation FactoryTalk DataMosaix Private Cloud are affected:
- Version 7.11
- Version 8.00
- Version 8.01

---

Impact Assessment


#### Potential Risks
If exploited, this vulnerability could have severe consequences for organizations, including:
- Unauthorized Data Access: Attackers could extract, modify, or delete sensitive data stored in the database.
- Operational Disruption: Malicious database operations could disrupt manufacturing processes, leading to downtime and financial losses.
- Compliance Violations: Unauthorized access to critical data may result in non-compliance with industry regulations, such as NIST, ISO 27001, or sector-specific standards.

#### Targeted Sectors
The critical manufacturing sector is particularly at risk due to its reliance on industrial control systems (ICS) and operational technology (OT). Organizations in this sector often manage high-value assets, making them prime targets for cyberattacks.

---

Mitigation Steps


Rockwell Automation has provided the following recommendations to mitigate the risks associated with CVE-2025-12807:

#### Immediate Actions
1. Apply the Patch: Update FactoryTalk DataMosaix Private Cloud to Version 8.01.02 or later immediately.
2. Network Segmentation: Isolate control system networks and remote devices behind firewalls to limit exposure.
3. Access Controls: Restrict access to the affected software to authorized personnel only.
4. Monitor for Suspicious Activity: Implement logging and monitoring to detect unusual database operations or API calls.

#### Long-Term Strategies
- Defensive Measures: Follow CISA’s recommended practices for control systems security, including:
- Minimizing network exposure for all control system devices.
- Using Virtual Private Networks (VPNs) for remote access, ensuring they are updated to the latest version.
- Implementing defense-in-depth strategies to enhance overall security posture.
- Regular Audits: Conduct periodic security audits and vulnerability assessments to identify and address potential risks.

---

Conclusion


The discovery of CVE-2025-12807 underscores the critical importance of securing industrial control systems against evolving cyber threats. Organizations using Rockwell Automation FactoryTalk DataMosaix Private Cloud must act swiftly to apply the provided patch and implement recommended security measures. Failure to address this vulnerability could expose sensitive data, disrupt operations, and compromise compliance.

As cyber threats continue to target critical infrastructure, proactive security practices and timely updates remain essential to safeguarding industrial environments.

---

References


[^1]: Rockwell Automation. "[FactoryTalk DataMosaix Private Cloud Advisory](https://www.cisa.gov/news-events/ics-advisories/icsa-26-013-02)". CISA. Retrieved 2025-01-24.
[^2]: CVE Details. "[CVE-2025-12807](https://www.cve.org/CVERecord?id=CVE-2025-12807)". Retrieved 2025-01-24.
[^3]: CISA. "[Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies](https://www.cisa.gov/ics)". Retrieved 2025-01-24.

Related CVEs