2026 Futuriom 50: Highlights →Explore

Executive Summary

In September 2025, a critical vulnerability (CVE-2025-5086, CVSS 9.0) in Dassault Systèmes DELMIA Apriso Manufacturing Operations Management software was found to be actively exploited in the wild. Threat actors leveraged this flaw to gain unauthorized access, bypassing authentication and executing arbitrary code on exposed systems. The breach impacted several manufacturing sector organizations globally, leading to disruptions in operational technology, potential data compromise, and urgent incident response actions. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) responded by adding the flaw to its Known Exploited Vulnerabilities (KEV) catalog and issuing public guidance for immediate patching and mitigation.

This incident is significant as adversaries continue to target vulnerable OT/IoT platforms central to manufacturing operations. The increased frequency of high-severity vulnerabilities in critical infrastructure software, combined with rapid weaponization by threat actors, is driving regulatory scrutiny and highlighting the urgent need for robust vulnerability management and zero trust controls across industrial environments.

Why This Matters Now

This vulnerability is being exploited in the wild, putting manufacturing environments at immediate risk. The active nature of these attacks underscores the urgency for manufacturers and related industries to rapidly patch DELMIA Apriso systems and strengthen segmentation and monitoring controls to prevent further compromise of operational technology.

Attack Path Analysis

Related CVEs

MITRE ATT&CK® Techniques

Potential Compliance Exposure

Sector Implications

Sources

Frequently Asked Questions

CVE-2025-5086 is a critical vulnerability in DELMIA Apriso's MOM software allowing remote attackers to bypass authentication and execute arbitrary code, putting manufacturing operations at high risk.

Cloud Native Security Fabric Mitigations and ControlsCNSF

CNSF-aligned controls like Zero Trust Segmentation, East-West Traffic Security, inline IPS, and strict egress enforcement would have significantly constrained or detected this attack at multiple points, reducing blast radius, stopping lateral movement, and blocking data exfiltration. Centralized visibility and anomaly detection further enables rapid response and containment.

Initial Compromise

Control: Inline IPS (Suricata)

Mitigation: Prevented exploit payloads targeting known vulnerabilities.

Privilege Escalation

Control: Zero Trust Segmentation

Mitigation: Blocked lateral access to high-privilege assets.

Lateral Movement

Control: East-West Traffic Security

Mitigation: Detected and prevented unauthorized inter-workload movement.

Command & Control

Control: Egress Security & Policy Enforcement

Mitigation: Blocked unauthorized external communications.

Exfiltration

Control: Encrypted Traffic (HPE) & Egress Security & Policy Enforcement

Mitigation: Detected and blocked suspicious outbound data transfer.

Impact (Mitigations)

Rapid detection and alerting on disruptive behavior.

Impact at a Glance

Affected Business Functions

  • Manufacturing Operations Management
  • Supply Chain Management
Operational Disruption

Estimated downtime: 5 days

Financial Impact

Estimated loss: $500,000

Data Exposure

Potential exposure of sensitive manufacturing data, including proprietary production processes and client information.

Recommended Actions

  • Prioritize patching of public-facing applications like DELMIA Apriso and incorporate inline IPS controls for real-time exploit prevention.
  • Enforce Zero Trust Segmentation to restrict workload and identity access paths, minimizing lateral movement potential.
  • Deploy granular east-west traffic policies and monitoring to detect and block unauthorized internal connections.
  • Strengthen egress filtering and encrypted traffic controls to stop exfiltration and external C2.
  • Implement automated anomaly detection to accelerate incident response and minimize operational disruption.

Secure the Paths Between Cloud Workloads

A cloud-native security fabric that enforces Zero Trust across workload communication—reducing attack paths, compliance risk, and operational complexity.

Cta pattren Image