Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Warns of Exploited DELMIA Factory Software Vulnerabilities

CISA Warns of Exploited DELMIA Factory Software Vulnerabilities

Posted on October 29, 2025October 29, 2025 By CWS

The US cybersecurity company CISA on Tuesday warned that two latest vulnerabilities in DELMIA Apriso manufacturing facility software program have been exploited in assaults.

A producing operations administration (MOM) and manufacturing execution system (MES) software program made by French firm Dassault Systèmes, DELMIA Apriso allows the administration of the complete manufacturing course of.

The 2 flaws flagged as exploited are tracked as CVE-2025-6204 (CVSS rating of 8.0) and CVE-2025-6205 (CVSS rating of 9.1), and have an effect on DELMIA Apriso from launch 2020 by means of launch 2025.

CVE-2025-6204 is described as a code injection bug that permits attackers to execute arbitrary code, whereas CVE-2025-6205 is a lacking authorization problem that may be exploited to achieve privileged entry to the appliance.

In response to ProjectDiscovery, the 2 safety defects may be chained collectively to create accounts with elevated privileges after which place executable recordsdata right into a web-served listing.

“The product exposes a SOAP-based message processor endpoint that accepts XML payloads for bulk worker/identification provisioning. Individually, the product exposes a file add API utilized by portal parts however that’s accessible solely post-authentication,” ProjectDiscovery notes.

Attackers can ship unauthenticated requests to the SOAP message processor to create an arbitrary account and assign it excessive privileges. Then, they’ll authenticate because the newly created consumer and drop executables into the server’s internet root.

Dassault Systèmes launched patches and barebone advisories for the 2 vulnerabilities on August 4, and ProjectDiscovery revealed technical particulars on September 23.Commercial. Scroll to proceed studying.

Now, CISA says that each points have been exploited within the wild, by including them to its Identified Exploited Vulnerabilities (KEV) checklist. As mandated by Binding Operational Directive (BOD) 22-01, federal businesses ought to patch the issues inside three weeks.

Whereas BOD 22-01 solely applies to federal businesses, all organizations ought to evaluation CISA’s KEV checklist and apply patches and mitigations for the safety defects it describes.

To hunt for potential compromise by means of susceptible DELMIA Apriso deployments, organizations ought to test for newly created privileged accounts and may scan directories for executables comparable to webshells.

Final month, CISA warned that menace actors have been exploiting one other DELMIA Apriso vulnerability, CVE-2025-5086 (CVSS rating of 9.0), which may result in distant code execution.

Associated: Yr-Outdated WordPress Plugin Flaws Exploited to Hack Web sites

Associated: QNAP NetBak PC Agent Affected by Latest ASP.NET Core Vulnerability

Associated: Lanscope Endpoint Supervisor Zero-Day Exploited within the Wild

Associated: RondoDox Botnet Takes ‘Exploit Shotgun’ Strategy

Security Week News Tags:CISA, DELMIA, Exploited, Factory, Software, Vulnerabilities, Warns

Post navigation

Previous Post: Microsoft Sued for Allegedly Misleading Millions to Subscribe for Microsoft 365 Subscriptions
Next Post: 10 npm Packages Caught Stealing Developer Credentials on Windows, macOS, and Linux

Related Posts

In Other News: India-Pakistan Cyberattacks, Radware Vulnerabilities, xAI Leak In Other News: India-Pakistan Cyberattacks, Radware Vulnerabilities, xAI Leak Security Week News
Akira Ransomware Group Made 4 Million in Ransom Proceeds Akira Ransomware Group Made $244 Million in Ransom Proceeds Security Week News
CodeSecCon 2025: Where Software Security’s Next Chapter Unfolds CodeSecCon 2025: Where Software Security’s Next Chapter Unfolds Security Week News
Cloudflare Outage Not Caused by Cyberattack Cloudflare Outage Not Caused by Cyberattack Security Week News
Major Cybersecurity M&A Deals in January 2026 Major Cybersecurity M&A Deals in January 2026 Security Week News
Chrome 137, Firefox 139 Patch High-Severity Vulnerabilities Chrome 137, Firefox 139 Patch High-Severity Vulnerabilities Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Google Chrome Update Fixes 26 Security Vulnerabilities
  • Critical Jenkins Security Flaws Threaten Server Safety
  • Ransomware Tactics Evolve Beyond Vulnerable Drivers
  • FBI and Thai Authorities Combat Southeast Asia Cyber Scams
  • Trivy Security Breach: 75 Tags Compromised in GitHub Actions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Google Chrome Update Fixes 26 Security Vulnerabilities
  • Critical Jenkins Security Flaws Threaten Server Safety
  • Ransomware Tactics Evolve Beyond Vulnerable Drivers
  • FBI and Thai Authorities Combat Southeast Asia Cyber Scams
  • Trivy Security Breach: 75 Tags Compromised in GitHub Actions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark