Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Active Exploits Hit Dassault and XWiki — CISA Confirms Critical Flaws Under Attack

Posted on October 29, 2025October 29, 2025 By CWS

Oct 29, 2025Ravie LakshmananVulnerability / Malware
Menace actors are actively exploiting a number of safety flaws impacting Dassault Systèmes DELMIA Apriso and XWiki, in accordance with alerts issued by the U.S. Cybersecurity and Infrastructure Safety Company (CISA) and VulnCheck.
The vulnerabilities are listed beneath –

CVE-2025-6204 (CVSS rating: 8.0) – A code injection vulnerability in Dassault Systèmes DELMIA Apriso that might enable an attacker to execute arbitrary code.
CVE-2025-6205 (CVSS rating: 9.1) – A lacking authorization vulnerability in Dassault Systèmes DELMIA Apriso that might enable an attacker to achieve privileged entry to the appliance.
CVE-2025-24893 (CVSS rating: 9.8) – An improper neutralization of enter in a dynamic analysis name (aka eval injection) in XWiki that might enable any visitor consumer to carry out arbitrary distant code execution by a request to the “/bin/get/Primary/SolrSearch” endpoint.

Each CVE-2025-6204 and CVE-2025-6205 have an effect on DELMIA Apriso variations from Launch 2020 by Launch 2025. They had been addressed by Dassault Systèmes in early August.

Apparently, the addition of the 2 shortcomings to the Recognized Exploited Vulnerabilities (KEV) catalog comes a little bit over a month after CISA flagged the exploitation of one other crucial flaw in the identical product (CVE-2025-5086, CVSS rating: 9.0), per week after the SANS Web Storm Heart detected in-the-wild makes an attempt. It is at the moment not identified if these efforts are associated.
VulnCheck, which detected exploitation makes an attempt focusing on CVE-2025-24893, stated the vulnerability is being abused as a part of a two-stage assault chain that delivers a cryptocurrency miner. In response to CrowdSec and Cyble, the vulnerability is claimed to have been weaponized in real-world assaults way back to March 2025.

“We noticed a number of exploit makes an attempt in opposition to our XWiki canaries coming from an attacker geolocated in Vietnam,” VulnCheck’s Jacob Baines stated. “The exploitation proceeds in a two-pass workflow separated by at the very least 20 minutes: the primary go phases a downloader (writes a file to disk), and the second go later executes it.”
The payload makes use of wget to retrieve a downloader (“x640”) from “193.32.208[.]24:8080” and write it to the “/tmp/11909” location. The downloader, in flip, runs shell instructions to fetch two extra payloads from the identical server –

x521, which fetches the cryptocurrency miner situated at “193.32.208[.]24:8080/rDuiQRKhs5/tcrond”
x522, which kills competing miners akin to XMRig and Kinsing, and launches the miner with a c3pool.org configuration

The assault site visitors, per VulnCheck, originates from an IP tackle that geolocates to Vietnam (“123.25.249[.]88”) and has been flagged as malicious in AbuseIPDB for participating in brute-force makes an attempt as just lately as October 26, 2025.
In mild of energetic exploitation, customers are suggested to use the mandatory updates as quickly as potential to safeguard in opposition to threats. A number of Civilian Govt Department (FCEB) companies are required to remediate the DELMIA Apriso flaws by November 18, 2025.

The Hacker News Tags:Active, Attack, CISA, Confirms, Critical, Dassault, Exploits, Flaws, Hit, XWiki

Post navigation

Previous Post: Microsoft Details ASP.NET Vulnerability That Enables Attackers To Smuggle HTTP Requests
Next Post: New Attack Targets DDR5 Memory to Steal Keys From Intel and AMD TEEs 

Related Posts

TA829 and UNK_GreenSec Share Tactics and Infrastructure in Ongoing Malware Campaigns The Hacker News
Researchers Find VS Code Flaw Allowing Attackers to Republish Deleted Extensions Under Same Names The Hacker News
New “Cavalry Werewolf” Attack Hits Russian Agencies with FoalShell and StallionRAT The Hacker News
Key Capabilities Security Leaders Need to Know The Hacker News
How Small Teams Can Secure Their Google Workspace The Hacker News
Vercel’s v0 AI Tool Weaponized by Cybercriminals to Rapidly Create Fake Login Pages at Scale The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Russian Hackers Attacking Government Entity Using Stealthy Living-Off-the-Land Tactics
  • Threat Actors Weaponizes Judicial Documents to Deliver PureHVNC RAT
  • Emerging Cyber Threats Featuring QR Codes ClickFix and LOLBins Challenging SOC Defenses
  • New Gentlemen’s RaaS Advertised on Hacking Forums Targeting Windows, Linux and ESXi Systems
  • Microsoft DNS Outage Disrupts Azure and Microsoft 365 Services Worldwide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Russian Hackers Attacking Government Entity Using Stealthy Living-Off-the-Land Tactics
  • Threat Actors Weaponizes Judicial Documents to Deliver PureHVNC RAT
  • Emerging Cyber Threats Featuring QR Codes ClickFix and LOLBins Challenging SOC Defenses
  • New Gentlemen’s RaaS Advertised on Hacking Forums Targeting Windows, Linux and ESXi Systems
  • Microsoft DNS Outage Disrupts Azure and Microsoft 365 Services Worldwide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News