
Urgent Security Alert: CISA Flags Actively Exploited Flaw in Widely-Used Manufacturing Software
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert, adding a high-severity vulnerability in a popular manufacturing software platform to its Known Exploited Vulnerabilities (KEV) catalog. This development signals that the flaw is not just a theoretical risk but is being actively exploited by malicious actors in the wild, demanding immediate attention from organizations across the industrial sector.
The vulnerability, tracked as CVE-2023-28353, affects Dassault Systèmes’ DELMIA Apriso, a Manufacturing Execution System (MES) used globally to manage and monitor production processes on the factory floor. The addition to the KEV catalog underscores the urgent need for all users of this software to take immediate protective measures.
Understanding the Threat: CVE-2023-28353
At its core, CVE-2023-28353 is a path traversal vulnerability with a high-severity CVSS score of 7.5. In simple terms, this flaw allows a remote, unauthenticated attacker to craft a special request to a vulnerable server. If successful, the attacker can access and read sensitive files stored on the system that should otherwise be restricted.
This type of vulnerability is particularly dangerous because it can serve as a gateway for attackers to:
- Steal sensitive corporate data, including intellectual property, production formulas, and operational schedules.
- Gather intelligence about the internal network and system configurations to plan further attacks.
- Obtain user credentials or other confidential information that could be used to escalate privileges and gain deeper access.
Given that MES platforms are deeply integrated into production environments, a compromise could have severe consequences beyond simple data theft, potentially leading to operational disruptions.
High Stakes for Manufacturing and Industrial Operations
The targeting of a Manufacturing Execution System like DELMIA Apriso is a significant concern for the operational technology (OT) and industrial control systems (ICS) communities. These systems are the digital backbone of modern manufacturing, connecting business planning with real-time factory floor activities.
A breach in an MES can directly threaten the integrity and availability of production lines. Attackers gaining access to such a central system could potentially disrupt supply chains, halt production, or manipulate operational data, leading to significant financial and reputational damage.
CISA Mandates Action: A Warning for All Organizations
By adding this flaw to the KEV catalog, CISA is legally mandating that all Federal Civilian Executive Branch (FCEB) agencies identify and patch the vulnerability on their networks. The deadline for federal compliance is July 16, 2024.
While this directive applies specifically to federal agencies, it serves as a powerful advisory for all private sector organizations. CISA only adds vulnerabilities to the KEV list when there is reliable evidence of active exploitation. Therefore, any company utilizing the affected versions of DELMIA Apriso should treat this alert with the same level of urgency.
Protect Your Systems: Immediate Steps to Mitigate Risk
Security teams and system administrators must act swiftly to address this threat. The following steps are recommended:
Identify and Audit: Immediately determine if your organization uses Dassault Systèmes DELMIA Apriso. The vulnerability is known to affect versions from 2017 through 2023.
Prioritize Patching: This is the most critical step. Apply the necessary security updates and patches provided by Dassault Systèmes without delay. Organizations should upgrade to a fixed version of the software to eliminate the vulnerability.
Hunt for Malicious Activity: Review server logs for any unusual or unauthorized access attempts, particularly those indicating path traversal patterns (e.g., requests containing
../). Suspicious activity could be a sign of a past or ongoing compromise.Enhance Network Security: Ensure that critical manufacturing systems are not unnecessarily exposed to the internet. Employ network segmentation to isolate OT environments from corporate IT networks, limiting the potential lateral movement of an attacker.
This CISA alert is a stark reminder that the critical infrastructure of manufacturing is a prime target for cyberattacks. Proactive patch management and a robust security posture are no longer optional—they are essential for maintaining operational resilience and protecting sensitive industrial data.
Source: https://securityaffairs.com/182120/hacking/u-s-cisa-adds-dassault-systemes-delmia-apriso-flaw-to-its-known-exploited-vulnerabilities-catalog.html


