CVE-2025-6205

9.1 CRITICAL CISA KEV

📋 TL;DR

A missing authorization vulnerability in DELMIA Apriso allows attackers to bypass authentication and gain privileged access to the application. This affects all DELMIA Apriso installations from Release 2020 through Release 2025. Attackers could potentially access sensitive data or take control of affected systems.

💻 Affected Systems

Products:
  • DELMIA Apriso
Versions: Release 2020 through Release 2025
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: All standard installations within the affected version range are vulnerable. The vulnerability exists in the application's authorization mechanism.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to access all application data, modify configurations, execute arbitrary code, and potentially pivot to other systems in the network.

🟠

Likely Case

Unauthorized access to sensitive business data, intellectual property, manufacturing processes, and potential disruption of operations.

🟢

If Mitigated

Limited impact with proper network segmentation, strong authentication controls, and monitoring in place to detect unauthorized access attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

CISA has confirmed this vulnerability is being actively exploited in the wild. Attackers need some level of access but can escalate privileges once inside.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Contact Dassault Systèmes for specific patch information

Vendor Advisory: https://www.3ds.com/trust-center/security/security-advisories/cve-2025-6205

Restart Required: Yes

Instructions:

1. Contact Dassault Systèmes support for the specific security patch
2. Apply the patch following vendor instructions
3. Restart the DELMIA Apriso application services
4. Verify the patch was successfully applied

🔧 Temporary Workarounds

Network Segmentation

all

Isolate DELMIA Apriso systems from untrusted networks and implement strict firewall rules

Enhanced Authentication

all

Implement multi-factor authentication and strong password policies for all user accounts

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the DELMIA Apriso application
  • Enable detailed logging and monitoring for all authentication and authorization events

🔍 How to Verify

Check if Vulnerable:

Check DELMIA Apriso version against affected range (Release 2020-2025) in application administration console

Check Version:

Check version in DELMIA Apriso administration console or contact Dassault Systèmes support

Verify Fix Applied:

Verify patch installation through vendor-provided verification tools or by confirming version is no longer in affected range

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts
  • Privilege escalation events
  • Unusual user activity patterns
  • Failed authorization checks

Network Indicators:

  • Unusual authentication requests
  • Suspicious API calls to authorization endpoints
  • Traffic from unexpected sources to DELMIA Apriso ports

SIEM Query:

source="delmia_apriso" AND (event_type="auth_failure" OR event_type="privilege_escalation" OR user="unknown")

🔗 References

📤 Share & Export