Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-6205: CWE-862 Missing Authorization in Dassault Systèmes DELMIA Apriso

0
Critical
VulnerabilityCVE-2025-6205cvecve-2025-6205cwe-862
Published: Mon Aug 04 2025 (08/04/2025, 09:14:42 UTC)
Source: CVE Database V5
Vendor/Project: Dassault Systèmes
Product: DELMIA Apriso

Description

A missing authorization vulnerability affecting DELMIA Apriso from Release 2020 through Release 2025 could allow an attacker to gain privileged access to the application.

AI-Powered Analysis

AILast updated: 10/28/2025, 04:08:21 UTC

Technical Analysis

CVE-2025-6205 is a critical security vulnerability classified under CWE-862 (Missing Authorization) affecting Dassault Systèmes DELMIA Apriso software from Release 2020 Golden through Release 2025 Golden. DELMIA Apriso is a manufacturing operations management platform widely used for coordinating production, supply chain, and quality processes. The vulnerability arises due to insufficient authorization checks within the application, allowing an unauthenticated remote attacker to gain privileged access to the system. The CVSS 3.1 base score of 9.1 reflects the high impact and ease of exploitation: the attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and affects confidentiality and integrity at a high level (C:H/I:H) without impacting availability (A:N). This means an attacker can remotely access sensitive data and potentially manipulate manufacturing workflows or configurations without needing any credentials or user involvement. The vulnerability spans multiple major releases, indicating a long-standing issue in the product line. Although no public exploits are currently known, the criticality and straightforward exploitation path make this a significant threat. The lack of available patches at the time of publication necessitates immediate compensating controls to reduce risk. The vulnerability could be leveraged to disrupt manufacturing operations, steal intellectual property, or sabotage production processes, posing severe risks to industrial and supply chain security.

Potential Impact

For European organizations, particularly those in manufacturing, automotive, aerospace, and industrial sectors that rely on DELMIA Apriso for operational management, this vulnerability poses a substantial risk. Successful exploitation could lead to unauthorized access to sensitive operational data, intellectual property theft, and manipulation of production workflows, potentially causing financial losses, reputational damage, and regulatory non-compliance. The integrity of manufacturing processes could be compromised, leading to defective products or operational downtime. Given the criticality and remote exploitation capability without authentication, attackers could infiltrate networks and pivot to other systems, amplifying the impact. The disruption of supply chains could have cascading effects across European industries, affecting exports and economic stability. Additionally, the exposure of confidential data could violate GDPR and other data protection regulations, resulting in legal penalties. The absence of known exploits currently provides a window for proactive defense, but the risk of future exploitation remains high.

Mitigation Recommendations

1. Monitor Dassault Systèmes communications closely for official patches and apply them immediately upon release to remediate the vulnerability. 2. Until patches are available, implement strict network segmentation to isolate DELMIA Apriso servers from untrusted networks and limit access to trusted administrative hosts only. 3. Employ robust access controls and multi-factor authentication on all interfaces related to DELMIA Apriso to reduce the attack surface. 4. Conduct thorough logging and continuous monitoring of application access and behavior to detect anomalous or unauthorized activities promptly. 5. Use intrusion detection and prevention systems (IDS/IPS) tuned to detect unusual network traffic patterns targeting DELMIA Apriso. 6. Review and harden firewall rules to restrict inbound traffic to necessary ports and sources. 7. Educate operational technology (OT) and IT security teams about this vulnerability to ensure rapid incident response readiness. 8. Perform regular security assessments and penetration testing focused on manufacturing systems to identify and remediate similar authorization weaknesses. 9. Coordinate with supply chain partners to ensure they are aware of the vulnerability and mitigation steps to prevent lateral movement. 10. Develop and test incident response plans specific to manufacturing system compromises to minimize operational disruption.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
3DS
Date Reserved
2025-06-17T14:03:19.819Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68907e6ead5a09ad00dfb9c6

Added to database: 8/4/2025, 9:33:34 AM

Last enriched: 10/28/2025, 4:08:21 AM

Last updated: 11/3/2025, 7:52:10 AM

Views: 97

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats