Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-5086: CWE-502 Deserialization of Untrusted Data in Dassault Systèmes DELMIA Apriso

0
Critical
VulnerabilityCVE-2025-5086cvecve-2025-5086cwe-502
Published: Mon Jun 02 2025 (06/02/2025, 17:42:42 UTC)
Source: CVE Database V5
Vendor/Project: Dassault Systèmes
Product: DELMIA Apriso

Description

A deserialization of untrusted data vulnerability affecting DELMIA Apriso from Release 2020 through Release 2025 could lead to a remote code execution.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 21:58:54 UTC

Technical Analysis

CVE-2025-5086 is a critical security vulnerability classified under CWE-502, which pertains to the deserialization of untrusted data. This vulnerability affects Dassault Systèmes DELMIA Apriso software versions from Release 2020 Golden through Release 2025 Golden. Deserialization vulnerabilities occur when an application deserializes data from untrusted sources without sufficient validation, allowing attackers to craft malicious serialized objects that, when deserialized, can execute arbitrary code on the target system. In this case, the vulnerability enables remote code execution (RCE) without requiring authentication or user interaction, making it particularly dangerous. The CVSS v3.1 base score of 9.0 reflects the critical nature of the flaw, with attack vector being network (AV:N), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), and scope changed (S:C), impacting confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability could allow attackers to fully compromise affected DELMIA Apriso instances, which are widely used in manufacturing and supply chain management for industrial operations. Although no public exploits have been reported yet, the potential impact is severe, warranting immediate attention from organizations using this software. The lack of available patches at the time of publication underscores the need for interim mitigations and vigilant monitoring.

Potential Impact

The impact of CVE-2025-5086 is substantial for organizations relying on DELMIA Apriso for manufacturing execution and supply chain management. Successful exploitation can lead to full remote code execution, allowing attackers to gain control over affected systems, steal sensitive intellectual property, disrupt production processes, or deploy ransomware and other malware. This can cause significant operational downtime, financial losses, and damage to reputation. Since DELMIA Apriso is often integrated with critical industrial control systems and enterprise resource planning (ERP) platforms, the compromise could cascade, affecting broader organizational infrastructure. The vulnerability’s network accessibility and lack of authentication requirements increase the risk of widespread exploitation, especially in environments with inadequate network segmentation or exposed management interfaces. The critical severity rating highlights the urgency for organizations to assess their exposure and implement protective measures promptly.

Mitigation Recommendations

Until official patches are released by Dassault Systèmes, organizations should implement the following mitigations: 1) Restrict network access to DELMIA Apriso management interfaces using firewalls and VPNs to limit exposure to trusted users and networks only. 2) Employ strict network segmentation to isolate DELMIA Apriso servers from general enterprise networks and the internet. 3) Monitor network traffic and system logs for unusual deserialization activity or unexpected remote code execution attempts. 4) Use application-layer firewalls or intrusion detection/prevention systems (IDS/IPS) configured to detect and block suspicious serialized payloads. 5) Conduct thorough inventory and risk assessments to identify all instances of affected DELMIA Apriso versions. 6) Prepare for rapid patch deployment once Dassault Systèmes releases updates by establishing a tested update process. 7) Educate IT and security teams about the risks of deserialization vulnerabilities and the specific threat posed by this CVE. 8) Consider implementing application whitelisting and endpoint protection solutions to limit the impact of potential exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
3DS
Date Reserved
2025-05-22T11:43:30.702Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683de64b182aa0cae24f7c49

Added to database: 6/2/2025, 5:58:35 PM

Last enriched: 2/26/2026, 9:58:54 PM

Last updated: 3/23/2026, 11:12:36 AM

Views: 216

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses