CVE-2025-6204: CWE-94 Improper Control of Generation of Code ('Code Injection') in Dassault Systèmes DELMIA Apriso
An Improper Control of Generation of Code (Code Injection) vulnerability affecting DELMIA Apriso from Release 2020 through Release 2025 could allow an attacker to execute arbitrary code.
AI Analysis
Technical Summary
CVE-2025-6204 is a vulnerability classified under CWE-94, indicating improper control over code generation, commonly known as code injection. This flaw exists in Dassault Systèmes DELMIA Apriso software versions from Release 2020 Golden through Release 2025 Golden. DELMIA Apriso is an industrial manufacturing operations management platform widely used for production planning, execution, and monitoring. The vulnerability allows an attacker with high privileges (PR:H) and network access (AV:N) to inject and execute arbitrary code remotely without requiring user interaction (UI:N). The vulnerability affects confidentiality, integrity, and availability (C:H/I:H/A:H) and has a scope change (S:C), meaning it can affect resources beyond the initially vulnerable component. Although no public exploits are known yet, the potential for severe impact is significant given the critical industrial environments where DELMIA Apriso is deployed. The vulnerability likely arises from insufficient validation or sanitization of inputs used in dynamic code generation or execution paths within the software, enabling attackers to craft malicious payloads that the system executes. The high attack complexity (AC:H) and requirement for high privileges suggest that exploitation may require an insider threat or a compromised account with elevated permissions. However, once exploited, the attacker can gain full control over the affected system, potentially disrupting manufacturing processes, stealing sensitive operational data, or causing physical damage through manipulated industrial controls.
Potential Impact
For European organizations, the impact of CVE-2025-6204 is substantial, particularly for those in manufacturing, automotive, aerospace, and other industrial sectors relying on DELMIA Apriso for operational management. Exploitation could lead to unauthorized access to sensitive production data, manipulation of manufacturing workflows, and disruption of critical industrial processes, resulting in financial losses, reputational damage, and safety hazards. The compromise of integrity and availability could halt production lines or cause defective products, affecting supply chains and market competitiveness. Confidentiality breaches may expose intellectual property and trade secrets. Given Europe's strong industrial base, especially in countries like Germany and France, the vulnerability poses a strategic risk. Additionally, the interconnected nature of industrial control systems increases the risk of cascading failures or broader operational disruptions across supply networks.
Mitigation Recommendations
Organizations should prioritize the following mitigations: 1) Monitor Dassault Systèmes communications closely for official patches or updates addressing CVE-2025-6204 and apply them immediately upon release. 2) Restrict network access to DELMIA Apriso systems using network segmentation and firewall rules to limit exposure to trusted users and systems only. 3) Enforce strict access controls and least privilege principles to minimize the number of users with high privileges required for exploitation. 4) Implement robust logging and monitoring to detect unusual code execution patterns or unauthorized changes in the system. 5) Conduct regular security audits and code reviews of any custom scripts or extensions integrated with DELMIA Apriso to identify potential injection vectors. 6) Employ application whitelisting and runtime application self-protection (RASP) where feasible to prevent unauthorized code execution. 7) Train staff on recognizing insider threats and suspicious activities, given the high privilege requirement for exploitation. 8) Develop and test incident response plans specifically for industrial control system compromises to minimize downtime and damage if exploitation occurs.
Affected Countries
Germany, France, Italy, United Kingdom, Spain, Netherlands, Belgium, Sweden
CVE-2025-6204: CWE-94 Improper Control of Generation of Code ('Code Injection') in Dassault Systèmes DELMIA Apriso
Description
An Improper Control of Generation of Code (Code Injection) vulnerability affecting DELMIA Apriso from Release 2020 through Release 2025 could allow an attacker to execute arbitrary code.
AI-Powered Analysis
Technical Analysis
CVE-2025-6204 is a vulnerability classified under CWE-94, indicating improper control over code generation, commonly known as code injection. This flaw exists in Dassault Systèmes DELMIA Apriso software versions from Release 2020 Golden through Release 2025 Golden. DELMIA Apriso is an industrial manufacturing operations management platform widely used for production planning, execution, and monitoring. The vulnerability allows an attacker with high privileges (PR:H) and network access (AV:N) to inject and execute arbitrary code remotely without requiring user interaction (UI:N). The vulnerability affects confidentiality, integrity, and availability (C:H/I:H/A:H) and has a scope change (S:C), meaning it can affect resources beyond the initially vulnerable component. Although no public exploits are known yet, the potential for severe impact is significant given the critical industrial environments where DELMIA Apriso is deployed. The vulnerability likely arises from insufficient validation or sanitization of inputs used in dynamic code generation or execution paths within the software, enabling attackers to craft malicious payloads that the system executes. The high attack complexity (AC:H) and requirement for high privileges suggest that exploitation may require an insider threat or a compromised account with elevated permissions. However, once exploited, the attacker can gain full control over the affected system, potentially disrupting manufacturing processes, stealing sensitive operational data, or causing physical damage through manipulated industrial controls.
Potential Impact
For European organizations, the impact of CVE-2025-6204 is substantial, particularly for those in manufacturing, automotive, aerospace, and other industrial sectors relying on DELMIA Apriso for operational management. Exploitation could lead to unauthorized access to sensitive production data, manipulation of manufacturing workflows, and disruption of critical industrial processes, resulting in financial losses, reputational damage, and safety hazards. The compromise of integrity and availability could halt production lines or cause defective products, affecting supply chains and market competitiveness. Confidentiality breaches may expose intellectual property and trade secrets. Given Europe's strong industrial base, especially in countries like Germany and France, the vulnerability poses a strategic risk. Additionally, the interconnected nature of industrial control systems increases the risk of cascading failures or broader operational disruptions across supply networks.
Mitigation Recommendations
Organizations should prioritize the following mitigations: 1) Monitor Dassault Systèmes communications closely for official patches or updates addressing CVE-2025-6204 and apply them immediately upon release. 2) Restrict network access to DELMIA Apriso systems using network segmentation and firewall rules to limit exposure to trusted users and systems only. 3) Enforce strict access controls and least privilege principles to minimize the number of users with high privileges required for exploitation. 4) Implement robust logging and monitoring to detect unusual code execution patterns or unauthorized changes in the system. 5) Conduct regular security audits and code reviews of any custom scripts or extensions integrated with DELMIA Apriso to identify potential injection vectors. 6) Employ application whitelisting and runtime application self-protection (RASP) where feasible to prevent unauthorized code execution. 7) Train staff on recognizing insider threats and suspicious activities, given the high privilege requirement for exploitation. 8) Develop and test incident response plans specifically for industrial control system compromises to minimize downtime and damage if exploitation occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- 3DS
- Date Reserved
- 2025-06-17T14:03:08.909Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68907e6ead5a09ad00dfb9c3
Added to database: 8/4/2025, 9:33:34 AM
Last enriched: 10/28/2025, 4:08:08 AM
Last updated: 11/3/2025, 6:14:06 PM
Views: 69
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-0218: Generation of Predictable Numbers or Identifiers in pgAgent
MediumCVE-2024-57823: CWE-191 Integer Underflow (Wrap or Wraparound) in librdf Raptor RDF Syntax Library
CriticalCVE-2024-57822: CWE-125 Out-of-bounds Read in librdf Raptor RDF Syntax Library
MediumCVE-2024-37568: n/a
HighCVE-2024-36357: CWE-1421 Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution in AMD AMD EPYC™ 7003 Series Processors
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.