
The US Cyber Security and Infrastructure Security Agency (CISA) is warning of hackers, which is exploiting the execution (MES) solution from an important remote code performance defects, a manufacturing operations (MOM) and French company Dassault Systems in Delmia Episo.
The agency added vulgarity, as tracked Cve-2025-5086 And for a significant severity score (CVSS V3: 9.0), for known, known exploited weaknesses (KV).
DELMIA Apriso is used in production processes for digitaling and monitoring. Enterprises rely on this to determine verthalvide production, for quality management, allocating resources, warehouse management and integration between production equipment and business applications.
It is usually deployed in motor vehicle, aerospace, electronics, high-technical and industrial machinery divisions, where high quality control, traceability, compliance and high level process standardization is important.
The defect is a deserialization of incredible data vulnerability that can give rise to distance code execution (RCE).
Seller Revealed this issue On June 2, given that without sharing several details, it affects all versions of Dalmia Episo released from 2020 released through 2020.
On September 3, threatened researcher Johannes Ulrich A post was published on SANS ISC, which reveals the observation of active exploitation efforts availing CVE-2015-5086.
Viewed exploitation involves sending a malicious Soap request to the weak closing points that is a base 64-encoded in the XML, GZIP-Net .NET is executable.
The actual payload is a Windows executable as tagged as malicious Hybrid analysis And flagged off by only one engine Wirstotal,
Malibly requests were generated from IP 156.244.33 (.) 162, possibly associated with automatic scan.
CISA is not associated with ULLRICH report, so it is not clear whether this is the report that has inspired them Add cve-2025-5086 to the kevOr if they had a separate source that confirms exploitation.
The US government agency is now providing a federal venture area by 2 October to implement available security updates or mitigations, or stops using Delmia Episo.
Although BOD 22-01 guidance is binding only to federal agencies, private organizations around the world should also consider CISA warning and take appropriate action.


