CVE Alert: CVE-2025-6205 – Dassault Systèmes – DELMIA Apriso

CVE-2025-6205

CRITICALExploitation active

A missing authorization vulnerability affecting DELMIA Apriso from Release 2020 through Release 2025 could allow an attacker to gain privileged access to the application.

CVSS v3.1 (9.1)
AV NETWORK · AC LOW · PR NONE · UI NONE · S UNCHANGED
Vendor
Dassault Systèmes
Product
DELMIA Apriso
Versions
Release 2020 Golden lte Release 2020 SP4 | Release 2021 Golden lte Release 2021 SP3 | Release 2022 Golden lte Release 2022 SP3 | Release 2023 Golden lte Release 2023 SP3 | Release 2024 Golden lte Release 2024 SP1 | Release 2025 Golden lte Release 2025 SP1
CWE
CWE-862, CWE-862 Missing Authorization
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Published
2025-08-04T09:14:42.308Z
Updated
2025-10-28T03:56:04.622Z

AI Summary Analysis

Risk verdict

Critical remote, unauthenticated vulnerability with active exploitation; treat as priority 1.

Why this matters

Allows privileged access without credentials and no user interaction, enabling potential data exfiltration, alteration or tampering within the application. In large deployments or supply-chain environments, rapid exploitation could disrupt operations and erode trust.

Most likely attack path

Network-based entry with no privileges required and no UI interaction means an attacker can reach exposed admin interfaces directly. With high confidentiality and integrity impact and low attack complexity, post-exploitation steps could grant total control over the application, facilitating further lateral movement within the same scope.

Who is most exposed

Enterprise and manufacturing environments with exposed management endpoints or poorly segmented networks are most at risk, especially where the affected platform is reachable from external networks or untrusted segments.

Detection ideas

  • Privileged configuration changes or admin actions arising from unexpected source IPs or outside normal admin hours.
  • Sudden spikes in privileged API calls or elevated-access activity from unauthenticated sessions.
  • Log anomalies indicating bypass of authorization checks or unusual data access patterns.
  • Anomalous provisioning of new users/roles linked to the application.
  • External network probes targeting admin endpoints or known exposure points.

Mitigation and prioritisation

  • Apply the vendor patch or upgrade to the fixed release per advisory; treat as priority 1.
  • If patching is delayed, implement compensating controls: restrict admin interface access to trusted networks, enforce VPN/MWAA access, apply strict allow-listing, and disable external exposure where feasible.
  • Segment networks to limit lateral movement; isolate critical data paths from exposed surfaces.
  • Enable/tune real-time monitoring for privileged actions and alert on anomalies; ensure rapid incident response playbooks and recovery procedures.
  • Plan and execute change management with staging tests, rollback/backup, and clear downtime windows. If KEV exploitation is confirmed, escalate urgency accordingly.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features