CISA Issues Alert on Active Exploitation of Dassault Systèmes Security Flaws

CISA Issues Alert on Active Exploitation of Dassault Systèmes Security Flaws

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical security alert regarding two severe vulnerabilities discovered in Dassault Systèmes DELMIA Apriso, a widely used manufacturing execution system.

The agency has added these flaws to its official list of vulnerabilities that pose immediate risks to organisations and require urgent mitigation action.

CVE ID Product Vulnerability Type Risk Level
CVE-2025-6204 Dassault Systèmes DELMIA Apriso Code Injection (CWE-94) Critical
CVE-2025-6205 Dassault Systèmes DELMIA Apriso Missing Authorization (CWE-862) Critical

Two critical security flaws have been identified in DELMIA Apriso, each presenting distinct attack vectors that could compromise enterprise systems.

The first vulnerability allows attackers to execute arbitrary code through code injection attacks, potentially giving them complete control over affected systems.

The second flaw stems from inadequate authorization controls, enabling attackers to bypass security restrictions and gain elevated privileges without proper credentials.

Both vulnerabilities were documented and added to CISA’s tracking list on October 28, 2025, indicating active concern about their exploitation in the wild.

DELMIA Apriso is deployed across manufacturing facilities worldwide, handling critical production workflows and operational data.

An attacker successfully exploiting these vulnerabilities could gain unauthorized access to sensitive manufacturing processes, intellectual property, and production schedules.

The potential for data theft, system disruption, and production shutdowns makes these vulnerabilities particularly serious for organizations in the manufacturing, aerospace, and defense sectors.

CISA has classified these threats as requiring immediate action. Organizations using DELMIA Apriso must treat this alert with the highest priority, as the window for exploitation is likely narrow before widespread attacks occur.

The agency has set a remediation deadline of November 18, 2025, giving organizations approximately three weeks to address the security issues.

Organizations should immediately inventory all systems running DELMIA Apriso and apply security updates provided by Dassault Systèmes. The company has released mitigations and patches that must be deployed as soon as possible.

CISA specifically references compliance with BOD 22-01 guidance for cloud-based deployments, requiring organizations to implement additional protections if using cloud versions of the software.

For organizations unable to apply patches within the deadline, CISA recommends either implementing compensating controls to block potential attack vectors or discontinuing use of the affected product until patches are available.

Network segmentation, access restrictions, and enhanced monitoring can provide temporary protection while awaiting patches.

This alert reinforces the critical importance of maintaining current security patches across enterprise systems.

Manufacturing and production environments should conduct immediate vulnerability assessments and coordinate with IT security teams to prioritize remediation.

Organizations should also review their incident response plans and ensure monitoring systems can detect suspicious activities targeting DELMIA Apriso installations.

The threat landscape continues to evolve, with attackers increasingly targeting manufacturing software as entry points for broader network compromise.

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link