CVE-2024-3300

9.0 CRITICAL

📋 TL;DR

An unsafe .NET object deserialization vulnerability in DELMIA Apriso allows attackers to execute arbitrary code without authentication. This affects all DELMIA Apriso installations from Release 2019 through Release 2024. Attackers can exploit this remotely to gain full control of affected systems.

💻 Affected Systems

Products:
  • DELMIA Apriso
Versions: Release 2019 through Release 2024
Operating Systems: Windows Server (typical deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: All standard installations are vulnerable. The vulnerability exists in the .NET deserialization component and requires no special configuration to be exploitable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining administrative privileges, data exfiltration, ransomware deployment, and lateral movement across the network.

🟠

Likely Case

Remote code execution leading to system takeover, data theft, and potential deployment of malware or backdoors.

🟢

If Mitigated

Limited impact if network segmentation and strict access controls prevent exploitation attempts from reaching vulnerable systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Pre-authentication RCE vulnerabilities in enterprise software are frequently weaponized quickly. The CWE-502 pattern is well-understood with available exploitation frameworks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Dassault Systèmes advisory for specific patched versions

Vendor Advisory: https://www.3ds.com/vulnerability/advisories

Restart Required: Yes

Instructions:

1. Review Dassault Systèmes security advisory
2. Download and apply the latest security patch from official vendor channels
3. Restart the DELMIA Apriso application services
4. Verify the patch is applied correctly

🔧 Temporary Workarounds

Network Segmentation

all

Isolate DELMIA Apriso systems from untrusted networks and internet access

Application Firewall Rules

all

Implement strict inbound firewall rules to limit access to Apriso services

🧯 If You Can't Patch

  • Immediately isolate affected systems from internet and untrusted networks
  • Implement strict network access controls and monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check Apriso version against affected range (2019-2024). Review system logs for deserialization errors or unexpected process execution.

Check Version:

Check Apriso administration console or application properties for version information

Verify Fix Applied:

Verify Apriso version is updated beyond affected range. Test deserialization functionality and monitor for patch application confirmation.

📡 Detection & Monitoring

Log Indicators:

  • Unusual .NET deserialization errors
  • Unexpected process execution from Apriso services
  • Abnormal network connections from Apriso servers

Network Indicators:

  • Suspicious inbound traffic to Apriso service ports
  • Outbound connections to unknown external IPs from Apriso servers

SIEM Query:

source="Apriso" AND (event_type="deserialization_error" OR process_execution="unexpected")

🔗 References

📤 Share & Export