CVE-2025-10559: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Dassault Systèmes DELMIA Factory Resource Manager
CVE-2025-10559 is a high-severity path traversal vulnerability in Dassault Systèmes DELMIA Factory Resource Manager versions from 3DEXPERIENCE R2023x through R2025x. It allows an attacker with limited privileges to read or write files in restricted directories on the server without user interaction. The flaw stems from improper limitation of pathname inputs, enabling traversal outside intended directories. Exploitation requires network access and some level of privileges but no user interaction. The vulnerability impacts confidentiality significantly by exposing sensitive files, with limited impact on integrity and no direct availability impact. No known exploits are currently reported in the wild. Organizations using DELMIA Factory Resource Manager in manufacturing and industrial environments should prioritize patching once available and implement strict access controls. Countries with strong manufacturing sectors and significant DELMIA deployments are at higher risk. Given the CVSS 7. 1 score, this vulnerability demands urgent attention to prevent potential data breaches or unauthorized file modifications.
AI Analysis
Technical Summary
CVE-2025-10559 is a path traversal vulnerability identified in Dassault Systèmes' DELMIA Factory Resource Manager, specifically affecting releases from 3DEXPERIENCE R2023x Golden through R2025x Golden. The vulnerability arises due to improper validation and limitation of pathname inputs (CWE-22), allowing an attacker to manipulate file path parameters to access or modify files outside the intended directory scope on the server hosting the Factory Resource Manager. This flaw can be exploited remotely over the network (AV:N) with low attack complexity (AC:L), requiring the attacker to have some level of privileges (PR:L), but no user interaction (UI:N) is necessary. The vulnerability impacts confidentiality highly (C:H) by enabling unauthorized reading of sensitive files, while integrity impact is low (I:L) due to limited write capabilities, and availability is unaffected (A:N). The scope remains unchanged (S:U), meaning the vulnerability affects only the vulnerable component. Although no public exploits have been reported yet, the vulnerability's nature and affected product's critical role in manufacturing resource management pose significant risks. DELMIA Factory Resource Manager is widely used in industrial and manufacturing sectors for factory planning and resource management, making this vulnerability particularly concerning for organizations relying on these systems for operational continuity and intellectual property protection.
Potential Impact
The primary impact of CVE-2025-10559 is the unauthorized disclosure of sensitive information due to the ability to read arbitrary files on the server. This can lead to exposure of intellectual property, configuration files, credentials, or other sensitive data critical to manufacturing operations. The ability to write files, although limited, could allow attackers to modify configuration or operational files, potentially leading to process disruptions or further compromise. Given the industrial context, such unauthorized access could disrupt factory resource planning, cause operational delays, or facilitate further attacks such as ransomware or espionage. Organizations worldwide that rely on DELMIA Factory Resource Manager for factory automation and resource management face risks to confidentiality and operational integrity. The vulnerability could also be leveraged as a foothold for lateral movement within corporate networks. The absence of known exploits currently provides a window for mitigation, but the high CVSS score indicates a serious threat if exploited.
Mitigation Recommendations
To mitigate CVE-2025-10559, organizations should implement the following specific measures: 1) Monitor Dassault Systèmes advisories closely and apply patches or updates as soon as they become available for the affected DELMIA Factory Resource Manager releases. 2) Restrict network access to the Factory Resource Manager servers by implementing network segmentation and firewall rules to limit exposure to trusted users and systems only. 3) Enforce the principle of least privilege by ensuring that user accounts and service accounts interacting with the Factory Resource Manager have minimal necessary permissions, reducing the impact of compromised credentials. 4) Conduct input validation and sanitization on any user-supplied file path parameters at the application or proxy level if possible, to detect and block path traversal attempts. 5) Implement file integrity monitoring on critical directories to detect unauthorized file modifications or creations. 6) Review and harden server configurations to limit file system permissions, ensuring the application process cannot access directories beyond its scope. 7) Employ logging and alerting mechanisms to detect suspicious file access patterns indicative of path traversal exploitation attempts. 8) Conduct regular security assessments and penetration testing focused on path traversal and related vulnerabilities in the Factory Resource Manager environment.
Affected Countries
United States, Germany, France, Japan, South Korea, China, Italy, United Kingdom, Canada, Switzerland, Netherlands, Belgium, India
CVE-2025-10559: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Dassault Systèmes DELMIA Factory Resource Manager
Description
CVE-2025-10559 is a high-severity path traversal vulnerability in Dassault Systèmes DELMIA Factory Resource Manager versions from 3DEXPERIENCE R2023x through R2025x. It allows an attacker with limited privileges to read or write files in restricted directories on the server without user interaction. The flaw stems from improper limitation of pathname inputs, enabling traversal outside intended directories. Exploitation requires network access and some level of privileges but no user interaction. The vulnerability impacts confidentiality significantly by exposing sensitive files, with limited impact on integrity and no direct availability impact. No known exploits are currently reported in the wild. Organizations using DELMIA Factory Resource Manager in manufacturing and industrial environments should prioritize patching once available and implement strict access controls. Countries with strong manufacturing sectors and significant DELMIA deployments are at higher risk. Given the CVSS 7. 1 score, this vulnerability demands urgent attention to prevent potential data breaches or unauthorized file modifications.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-10559 is a path traversal vulnerability identified in Dassault Systèmes' DELMIA Factory Resource Manager, specifically affecting releases from 3DEXPERIENCE R2023x Golden through R2025x Golden. The vulnerability arises due to improper validation and limitation of pathname inputs (CWE-22), allowing an attacker to manipulate file path parameters to access or modify files outside the intended directory scope on the server hosting the Factory Resource Manager. This flaw can be exploited remotely over the network (AV:N) with low attack complexity (AC:L), requiring the attacker to have some level of privileges (PR:L), but no user interaction (UI:N) is necessary. The vulnerability impacts confidentiality highly (C:H) by enabling unauthorized reading of sensitive files, while integrity impact is low (I:L) due to limited write capabilities, and availability is unaffected (A:N). The scope remains unchanged (S:U), meaning the vulnerability affects only the vulnerable component. Although no public exploits have been reported yet, the vulnerability's nature and affected product's critical role in manufacturing resource management pose significant risks. DELMIA Factory Resource Manager is widely used in industrial and manufacturing sectors for factory planning and resource management, making this vulnerability particularly concerning for organizations relying on these systems for operational continuity and intellectual property protection.
Potential Impact
The primary impact of CVE-2025-10559 is the unauthorized disclosure of sensitive information due to the ability to read arbitrary files on the server. This can lead to exposure of intellectual property, configuration files, credentials, or other sensitive data critical to manufacturing operations. The ability to write files, although limited, could allow attackers to modify configuration or operational files, potentially leading to process disruptions or further compromise. Given the industrial context, such unauthorized access could disrupt factory resource planning, cause operational delays, or facilitate further attacks such as ransomware or espionage. Organizations worldwide that rely on DELMIA Factory Resource Manager for factory automation and resource management face risks to confidentiality and operational integrity. The vulnerability could also be leveraged as a foothold for lateral movement within corporate networks. The absence of known exploits currently provides a window for mitigation, but the high CVSS score indicates a serious threat if exploited.
Mitigation Recommendations
To mitigate CVE-2025-10559, organizations should implement the following specific measures: 1) Monitor Dassault Systèmes advisories closely and apply patches or updates as soon as they become available for the affected DELMIA Factory Resource Manager releases. 2) Restrict network access to the Factory Resource Manager servers by implementing network segmentation and firewall rules to limit exposure to trusted users and systems only. 3) Enforce the principle of least privilege by ensuring that user accounts and service accounts interacting with the Factory Resource Manager have minimal necessary permissions, reducing the impact of compromised credentials. 4) Conduct input validation and sanitization on any user-supplied file path parameters at the application or proxy level if possible, to detect and block path traversal attempts. 5) Implement file integrity monitoring on critical directories to detect unauthorized file modifications or creations. 6) Review and harden server configurations to limit file system permissions, ensuring the application process cannot access directories beyond its scope. 7) Employ logging and alerting mechanisms to detect suspicious file access patterns indicative of path traversal exploitation attempts. 8) Conduct regular security assessments and penetration testing focused on path traversal and related vulnerabilities in the Factory Resource Manager environment.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- 3DS
- Date Reserved
- 2025-09-16T12:56:50.206Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69cc1e09e6bfc5ba1d33b7e5
Added to database: 3/31/2026, 7:18:33 PM
Last enriched: 3/31/2026, 7:19:18 PM
Last updated: 4/1/2026, 3:51:30 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.