First published: Tue Jan 28 2025(Updated: )
A path traversal vulnerability exists in the Rockwell Automation DataEdge Platform DataMosaix Private Cloud. By specifying the character sequence in the body of the vulnerable endpoint, it is possible to overwrite files outside of the intended directory. A threat actor with admin privileges could leverage this vulnerability to overwrite reports including user projects.
Credit: PSIRT@rockwellautomation.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwell Automation DataMosaix Private Cloud |
Corrected in software version 7.11.01 and later.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0659 is classified as a high-severity vulnerability due to its potential to allow unauthorized file overwrites.
To fix CVE-2025-0659, ensure that you update to the latest secure version of the Rockwell Automation DataMosaix Private Cloud.
CVE-2025-0659 affects the Rockwell Automation DataMosaix Private Cloud platform.
Any organization utilizing the vulnerable versions of the Rockwell Automation DataMosaix Private Cloud is at risk of CVE-2025-0659.
If exploited, CVE-2025-0659 enables an attacker to overwrite sensitive files outside the intended directory, potentially compromising the system.