Forwarded from Taiwan Computer Network Crisis Management and Coordination Center: Cybersecurity Alert TWCERTCC-200-202511-00000001
[Content Description]
1. [CVE-2025-6204] Dassault Systèmes DELMIA Apriso Code Injection Vulnerability (CVSS v3.1: 8.0)
[Whether it is exploited by ransomware: Unknown] The Dassault Systèmes DELMIA Apriso contains a code injection vulnerability that could allow attackers to execute arbitrary code.
2. [CVE-2025-6205] Dassault Systèmes DELMIA Apriso Missing Authorization Vulnerability (CVSS v3.1: 9.1)
[Exploited by ransomware: Unknown]** The Dassault Systèmes DELMIA Apriso vulnerability contains a missing authorization vulnerability that could allow an attacker to gain privileged access to the corresponding program.
3. [CVE-2025-41244] Broadcom VMware Aria Operations and VMware Tools Privilege Defined with Unsafe Actions Vulnerability (CVSS v3.1: 7.8)**
[Exploited by ransomware: Unknown]** Broadcom VMware Aria Operations and VMware Tools contain a local privilege escalation vulnerability. A malicious local user without administrator privileges who gains access to a virtual machine that has VMware Tools installed, is managed by Aria Operations, and has SDMP enabled can exploit this vulnerability to escalate privileges to root on that virtual machine.
4. [CVE-2025-24893] XWiki Platform Eval Injection Vulnerability (CVSS v3.1: 9.8)
[Ransomware Exploitation Possible: Known] The XWiki Platform contains an eval injection vulnerability that could allow any visitor to execute arbitrary remote code by sending a request to SolrSearch.
[Affected Platforms]
1. [CVE-2025-6204] Please refer to the official list of affected versions:
https://www.3ds.com/trust-center/security/security-advisories/cve-2025-6204
2. [CVE-2025-6205] Please refer to the official list of affected versions:
https://www.3ds.com/trust-center/security/security-advisories/cve-2025-6205
3. [CVE-2025-41244] Please refer to the official list of affected versions: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36149
4. [CVE-2025-24893] Please refer to the official list of affected versions. https://jira.xwiki.org/browse/XWIKI-22149
[Recommended Measures]
1. [CVE-2025-6204] An official patch update has been released for this vulnerability. Please update to the relevant version. https://www.3ds.com/trust-center/security/security-advisories/cve-2025-6204
2. [CVE-2025-6205] An official patch update has been released for this vulnerability. Please update to the relevant version. https://www.3ds.com/trust-center/security/security-advisories/cve-2025-6205
3. [CVE-2025-41244] An official patch update has been released for this vulnerability. Please update to the relevant version. https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36149
4. [CVE-2025-24893] An official patch update has been released to fix this vulnerability. Please update to the relevant version: https://jira.xwiki.org/browse/XWIKI-22149