CVE-2025-6204

8.0 HIGH CISA KEV

📋 TL;DR

This CVE describes a code injection vulnerability in DELMIA Apriso manufacturing software that allows attackers to execute arbitrary code on affected systems. Organizations using DELMIA Apriso releases 2020 through 2025 are vulnerable. The vulnerability has been added to CISA's Known Exploited Vulnerabilities catalog, indicating active exploitation.

💻 Affected Systems

Products:
  • DELMIA Apriso
Versions: Release 2020 through Release 2025
Operating Systems: Windows Server (typically)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments of DELMIA Apriso within the specified version range regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary code with the privileges of the Apriso service account, potentially leading to data theft, ransomware deployment, or lateral movement within manufacturing networks.

🟠

Likely Case

Attackers gain initial foothold in manufacturing environments, potentially disrupting operations, stealing intellectual property, or using compromised systems as pivot points to other critical infrastructure.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the Apriso application server, though data exfiltration or service disruption remains possible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CISA has confirmed exploitation in the wild and added this to their Known Exploited Vulnerabilities catalog. The CWE-94 classification suggests relatively straightforward exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Contact Dassault Systèmes for specific patch information

Vendor Advisory: https://www.3ds.com/trust-center/security/security-advisories/cve-2025-6204

Restart Required: Yes

Instructions:

1. Contact Dassault Systèmes support for the specific security patch
2. Apply the patch following vendor instructions
3. Restart Apriso services as required
4. Test functionality after patching

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Apriso servers from internet and restrict internal network access

Application Firewall Rules

all

Implement WAF rules to block suspicious input patterns

🧯 If You Can't Patch

  • Immediately isolate Apriso servers from internet and restrict to necessary internal connections only
  • Implement strict network monitoring and anomaly detection for Apriso traffic

🔍 How to Verify

Check if Vulnerable:

Check Apriso version against affected range (2020-2025 releases)

Check Version:

Check Apriso administration console or contact Dassault Systèmes support for version verification

Verify Fix Applied:

Verify patch installation through Apriso administration console or by confirming with Dassault Systèmes support

📡 Detection & Monitoring

Log Indicators:

  • Unusual process execution from Apriso service account
  • Suspicious network connections originating from Apriso servers
  • Unexpected file creation or modification in Apriso directories

Network Indicators:

  • Outbound connections from Apriso servers to suspicious external IPs
  • Unusual traffic patterns to/from Apriso application ports

SIEM Query:

source="apriso*" AND (process_execution="cmd.exe" OR process_execution="powershell.exe" OR network_connection="external_ip")

🔗 References

📤 Share & Export