#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

27 C
Dubai
Saturday, November 1, 2025
HomeTopics 1Application SecurityCISA Flags Two Actively Exploited Vulnerabilities in Dassault Systèmes Software

CISA Flags Two Actively Exploited Vulnerabilities in Dassault Systèmes Software

Date:

Related stories

spot_imgspot_imgspot_imgspot_img

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two new security flaws to its Known Exploited Vulnerabilities (KEV) Catalog, warning that attackers are actively exploiting them in the wild. The newly listed vulnerabilities-both found in Dassault Systèmes’ DELMIA Apriso manufacturing software-highlight an urgent need for organizations using the platform to patch immediately.

According to CISA, the affected flaws include CVE-2025-6204, a code injection vulnerability, and CVE-2025-6205, a missing authorization vulnerability. These issues, CISA warns, “pose significant risks to the federal enterprise” and are among the most common entry points for cyberattacks targeting industrial systems.

The vulnerabilities were identified as part of CISA’s ongoing effort to track and mitigate actively exploited software weaknesses through its Binding Operational Directive (BOD) 22-01 program. This directive mandates that Federal Civilian Executive Branch (FCEB) agencies patch known exploited vulnerabilities within a set timeframe to minimize risk to federal networks.

While the directive is legally binding for U.S. federal agencies, CISA strongly advises all organizations-public and private alike-to prioritize patching these vulnerabilities as part of a broader vulnerability management program.

These two flaws in Dassault Systèmes DELMIA Apriso, a software widely used in manufacturing, logistics, and supply chain management, could allow attackers to inject malicious code or bypass authorization controls. Successful exploitation may enable threat actors to manipulate production systems, steal sensitive industrial data, or disrupt critical manufacturing processes-posing serious risks to operational continuity.

Given that industrial and manufacturing systems are integral to critical infrastructure sectors such as energy, transport, and defense, the exploitation of these vulnerabilities could have ripple effects beyond any single organization.

MEA Context:

For enterprises across the Middle East and Africa, where digital transformation in manufacturing and logistics is accelerating, this alert serves as a wake-up call. Many regional industries rely on software like DELMIA Apriso for automation and supply chain optimization. An unpatched vulnerability in these systems could expose factories, logistics hubs, or even government projects to cyber sabotage or ransomware attacks—making proactive patching and awareness training essential.

10 Recommended Actions for Security Teams:

  1. Patch Immediately: Apply all available updates from Dassault Systèmes for DELMIA Apriso software.
  2. Check CISA’s KEV Catalog: Regularly review the Known Exploited Vulnerabilities list.
  3. Restrict Access: Limit network exposure of manufacturing or operational technology (OT) systems.
  4. Monitor for Indicators of Compromise (IoCs): Look for suspicious changes, code injections, or unauthorized access attempts.
  5. Review Privileges: Enforce the principle of least privilege for all DELMIA Apriso users and service accounts.
  6. Network Segmentation: Separate OT and IT networks to reduce lateral movement opportunities.
  7. Deploy Endpoint Protection: Use advanced endpoint detection solutions such as those recommended by Saintynet Cybersecurity.
  8. Enhance User Awareness: Train staff to recognize phishing or social engineering attempts that could lead to exploitation—see training.saintynet.com.
  9. Backup and Recovery: Maintain secure, offline backups of critical systems to mitigate ransomware or system tampering.
  10. Threat Intelligence Integration: Incorporate vulnerability feeds from trusted sources like CISA, MITRE, and Cybercory.com into your SOC workflows.

Conclusion:

CISA’s addition of these two vulnerabilities to the KEV catalog underscores a growing trend, industrial software is becoming a top target for cybercriminals. As attackers continue to exploit weak points in critical infrastructure and manufacturing platforms, swift action and continuous vigilance are vital.

Organizations that delay patching not only risk disruption but also jeopardize trust and operational safety. Whether in Washington, Dubai, or Johannesburg, the message is clear: stay updated, stay alert, and secure every link in your digital supply chain.

Ouaissou DEMBELE
Ouaissou DEMBELEhttp://cybercory.com
Ouaissou DEMBELE is a seasoned cybersecurity expert with over 12 years of experience, specializing in purple teaming, governance, risk management, and compliance (GRC). He currently serves as Co-founder & Group CEO of Sainttly Group, a UAE-based conglomerate comprising Saintynet Cybersecurity, Cybercory.com, and CISO Paradise. At Saintynet, where he also acts as General Manager, Ouaissou leads the company’s cybersecurity vision—developing long-term strategies, ensuring regulatory compliance, and guiding clients in identifying and mitigating evolving threats. As CEO, his mission is to empower organizations with resilient, future-ready cybersecurity frameworks while driving innovation, trust, and strategic value across Sainttly Group’s divisions. Before founding Saintynet, Ouaissou held various consulting roles across the MEA region, collaborating with global organizations on security architecture, operations, and compliance programs. He is also an experienced speaker and trainer, frequently sharing his insights at industry conferences and professional events. Ouaissou holds and teaches multiple certifications, including CCNP Security, CEH, CISSP, CISM, CCSP, Security+, ITILv4, PMP, and ISO 27001, in addition to a Master’s Diploma in Network Security (2013). Through his deep expertise and leadership, Ouaissou plays a pivotal role at Cybercory.com as Editor-in-Chief, and remains a trusted advisor to organizations seeking to elevate their cybersecurity posture and resilience in an increasingly complex threat landscape.

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Latest stories

spot_imgspot_imgspot_imgspot_img

LEAVE A REPLY

Please enter your comment!
Please enter your name here