Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      From Data To Decisions: UX Strategies For Real-Time Dashboards

      September 13, 2025

      Honeycomb launches AI observability suite for developers

      September 13, 2025

      Low-Code vs No-Code Platforms for Node.js: What CTOs Must Know Before Investing

      September 12, 2025

      ServiceNow unveils Zurich AI platform

      September 12, 2025

      Building personal apps with open source and AI

      September 12, 2025

      What Can We Actually Do With corner-shape?

      September 12, 2025

      Craft, Clarity, and Care: The Story and Work of Mengchu Yao

      September 12, 2025

      Distribution Release: Q4OS 6.1

      September 12, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Learning from PHP Log to File Example

      September 13, 2025
      Recent

      Learning from PHP Log to File Example

      September 13, 2025

      Online EMI Calculator using PHP – Calculate Loan EMI, Interest, and Amortization Schedule

      September 13, 2025

      Package efficiency and dependency hygiene

      September 13, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Dmitry — The Deep Magic

      September 13, 2025
      Recent

      Dmitry — The Deep Magic

      September 13, 2025

      Right way to record and share our Terminal sessions

      September 13, 2025

      Windows 11 Powers Up WSL: How GPU Acceleration & Kernel Upgrades Change the Game

      September 13, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»CISA Warns of Attacks on DELMIA Manufacturing Software Vulnerability

    CISA Warns of Attacks on DELMIA Manufacturing Software Vulnerability

    September 13, 2025

    DELMIA Apriso CVE-2025-5086 vulnerability CISA KEV

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a manufacturing operations management software vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, a rare addition of an industrial control system (ICS)/operational technology (OT) vulnerability to the KEV catalog.

    CVE-2025-5086 is a 9.0-rated Deserialization of Untrusted Data vulnerability in DELMIA Apriso, a manufacturing operations management (MOM) and manufacturing execution system (MES) software from Dassault Systèmes that is used to manage production processes and connect factory floors to enterprise resource planning (ERP) systems.

    The vulnerability affects DELMIA Apriso from Release 2020 through Release 2025 and could lead to remote code execution (RCE).

    DELMIA Apriso CVE-2025-5086 Exploits Detected

    The SANS Internet Storm Center (ISC) reported attack attempts targeting the DELMIA Apriso CVE-2025-5086 vulnerability in a September 3 blog post by Johannes Ullrich, ISC founder and Dean of Research for SANS Technology Institute.

    The scans detected by SANS appear to originate from the IP 156.244.33[.]162. The exploit uses SOAP requests to the WebServices/FlexNetOperationsService service, embedding a payload encoded in XML that decodes to a GZIP-compressed Windows executable. As of publication time, the payload is undetected by all but one security tool in VirusTotal.

    The string “Project Discovery CVE-2025-5086” suggests that the scan may originate from a vulnerability scanner, SANS said. In a note to clients, Cyble reported that the Nuclei scanning script for the vulnerability is available in the public domain.

    The DELMIA Apriso platform is used by major companies in sectors such as aerospace, automotive, and consumer goods. As Apriso underpins production workflows and supply chain visibility, a successful compromise could disrupt manufacturing processes, making timely patching and mitigation essential.

    “When I am thinking about the security of manufacturing environments, I am usually focusing on IoT devices integrated into production lines. All the little sensors and actuators are often very difficult to secure,” Ullrich wrote. “On the other hand, there is also ‘big software’ that is used to manage manufacturing. One example is DELMIA Apriso by Dassault Systèmes. This type of Manufacturing Operation Management (MOM) or Manufacturing Execution System (MES) ties everything together and promises to connect factory floors to ERP systems. But complex systems like this have bugs, too.”

    The Dassault security advisory on CVE-2025-5086 includes a link to remediation information.

    ICS/OT Vulnerabilities in the KEV Catalog

    CISA rarely adds ICS/OT vulnerabilities to the KEV catalog, although IT vulnerabilities in the KEV catalog often appear in ICS/OT products too.

    Perhaps the most recent ICS/OT vulnerability added to the KEV catalog before CVE-2025-5086 was CVE-2023-6448, a 9.8-severity Insecure Default Password vulnerability in Unitronics VisiLogic before version 9.9.00, used in Vision and Samba PLCs and HMIs. CISA added the vulnerability to the KEV catalog in December 2023.

    CISA has given Federal Civilian Executive Branch (FCEB) agencies a deadline of October 2 to apply updates to protect against CVE-2025-5086, and others affected by the vulnerability are urged to apply fixes too.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleFrom Data To Decisions: UX Strategies For Real-Time Dashboards
    Next Article Samsung Fixes Critical Zero-Day CVE-2025-21043 Exploited in Android Attacks

    Related Posts

    Artificial Intelligence

    Scaling Up Reinforcement Learning for Traffic Smoothing: A 100-AV Highway Deployment

    September 13, 2025
    Defending against Prompt Injection with Structured Queries (StruQ) and Preference Optimization (SecAlign)
    Artificial Intelligence

    Defending against Prompt Injection with Structured Queries (StruQ) and Preference Optimization (SecAlign)

    September 13, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-52856 – VioStor Improper Authentication Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-32992 – Thermo Fisher Scientific ePort Authentication Bypass

    Common Vulnerabilities and Exposures (CVEs)

    Luckfox 15.6″ Portable Monitor Review

    Linux

    CVE-2025-29659 – Yi IOT XY-3820 Remote Command Execution Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    CVE-2025-9389 – Vim Local Memory Corruption Vulnerability

    August 24, 2025

    CVE ID : CVE-2025-9389

    Published : Aug. 24, 2025, 1:15 p.m. | 11 hours, 43 minutes ago

    Description : A vulnerability was identified in vim 9.1.0000. Affected is the function __memmove_avx_unaligned_erms of the file memmove-vec-unaligned-erms.S. The manipulation leads to memory corruption. The attack needs to be performed locally. The exploit is publicly available and might be used. Some users are not able to reproduce this. One of the users mentions that this appears not to be working, “when coloring is turned on”.

    Severity: 4.8 | MEDIUM

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    CERT-In Flags Info Disclosure Flaw in TP-Link Tapo H200 Smart Hub

    CERT-In Flags Info Disclosure Flaw in TP-Link Tapo H200 Smart Hub

    April 9, 2025

    CVE-2025-47281 – Kyverno JMESPath Variable Substitution Denial of Service

    July 23, 2025

    Microsoft previews Spanish voice features for its Copilot Voice AI assistant

    April 9, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.