On October 22, 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a new vulnerability to its Known Exploited Vulnerabilities (KEV) catalog. The inclusion of a flaw in the KEV catalog is a significant event, as it serves as official confirmation from the U.S. government that the vulnerability is not just theoretical but is being actively and maliciously exploited in real-world attacks. While the specific CVE was not detailed in the initial alert, this action triggers Binding Operational Directive (BOD) 22-01, which legally compels Federal Civilian Executive Branch (FCEB) agencies to patch the vulnerability within a mandated timeframe. For private sector organizations, a KEV entry is a critical, high-priority signal to immediately assess their exposure and apply patches.
The CISA alert did not specify the CVE identifier or the affected product for the vulnerability added on October 22. This is sometimes done to give vendors or federal agencies a slight head start on remediation before publicizing the exact flaw more widely. However, the core message is unambiguous: a vulnerability in a likely widespread software or hardware product is being used in active attacks.
Binding Operational Directive (BOD) 22-01: This directive, issued by CISA, is the mechanism that makes the KEV catalog actionable for federal agencies. When a vulnerability is added, the directive sets a specific deadline by which all FCEB agencies must:
This process ensures that federal agencies prioritize the threats that matter most, rather than getting lost in the sea of all disclosed vulnerabilities.
While the specific product is unknown, vulnerabilities added to the KEV catalog typically affect widely deployed enterprise software and hardware, such as:
Organizations should monitor CISA's KEV catalog directly for the specific CVE details to be released.
Actively Exploited in the Wild. This is the defining characteristic of any vulnerability in the KEV catalog. It means that CISA has reliable evidence from partners—such as cybersecurity firms, researchers, or incident responders—that threat actors are currently using this vulnerability to compromise systems. This elevates the urgency far beyond a simple vulnerability disclosure or the availability of a proof-of-concept (PoC).
The potential impact of an actively exploited vulnerability is high. If left unpatched, organizations are exposed to a range of attacks, including:
For federal agencies, failure to comply with the BOD 22-01 deadline can result in censure and increased oversight.
Once the CVE is known, detection methods will become clearer. However, organizations can take proactive steps:
Patch Immediately. This is the primary remediation.
CISA identifies two critical vulnerabilities (CVE-2025-6204, CVE-2025-6205) in Dassault DELMIA Apriso manufacturing software, actively exploited and added to KEV catalog.
CISA has now identified the previously unspecified actively exploited vulnerability as two critical flaws (CVE-2025-6204, code injection; CVE-2025-6205, missing authorization) affecting Dassault Systèmes' DELMIA Apriso manufacturing software. These vulnerabilities, added to the KEV catalog on October 28, 2025, are confirmed to be under active exploitation, posing a severe risk to global manufacturing operations. Successful exploitation could lead to operational shutdowns, intellectual property theft, and potential pivot to OT networks. Organizations using DELMIA Apriso are urged to apply patches immediately as mandated for federal agencies.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats