On October 28, 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent directive concerning two vulnerabilities in Dassault Systèmes' DELMIA Apriso manufacturing operations management (MOM) platform. The vulnerabilities, CVE-2025-6205 and CVE-2025-6204, have been added to CISA's Known Exploited Vulnerabilities (KEV) catalog due to evidence of active exploitation. The more critical flaw, CVE-2025-6205, is a missing authorization vulnerability (CVSS 9.1) that allows an unauthenticated attacker to create a privileged user account. This can be chained with CVE-2025-6204, a code injection flaw (CVSS 8.0), to achieve remote code execution and full system takeover. Given the platform's prevalence in critical manufacturing, CISA has mandated that federal agencies patch affected systems by November 18, 2025.
The two vulnerabilities create a critical attack chain:
The combination of these two flaws, T1190 - Exploit Public-Facing Application followed by code execution, allows for a complete compromise of the affected manufacturing system.
Patches were made available by Dassault Systèmes in early August 2025.
According to CISA, both vulnerabilities are being actively exploited in the wild. The specific threat actors or campaigns leveraging these exploits have not been publicly disclosed. The addition to the KEV catalog confirms that these are not theoretical risks but are being used in real-world attacks. This elevates the urgency for all organizations using the affected software to apply patches immediately.
A successful exploit of this vulnerability chain could have devastating consequences for manufacturing organizations.
D3FEND Technique: Detection should focus on
D3-UBA - User Behavior Analysisto spot the creation of unauthorized privileged accounts andD3-FA - File Analysison web directories.
.jsp, .aspx, .exe). An attacker exploiting CVE-2025-6204 would likely drop a file to achieve code execution.D3FEND Countermeasure: The primary countermeasure is
D3-SU - Software Update. If patching is not immediately possible,Hardentechniques likeD3-ITF - Inbound Traffic Filteringare critical.
The most critical mitigation is to apply the security patches provided by Dassault Systèmes immediately.
Mapped D3FEND Techniques:
Restrict network access to the DELMIA Apriso application from the internet and limit it to only authorized internal subnets as a compensating control.
Mapped D3FEND Techniques:
Regularly audit user accounts on the system to detect and remove any unauthorized accounts created via exploitation.
Run the application in an isolated environment to contain any potential breach and prevent lateral movement into the broader ICS/OT network.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats