CVE-2024-32499: CWE-94 Improper Control of Generation of Code ('Code Injection') in Newforma Project Center Server
Newforma Project Center Server through 2023.3.0.32259 allows remote code execution because .NET Remoting is exposed.
AI Analysis
Technical Summary
CVE-2024-32499 is a medium-severity vulnerability affecting Newforma Project Center Server versions up to 2023.3.0.32259. The root cause is improper control of code generation (CWE-94), specifically due to the exposure of .NET Remoting interfaces. .NET Remoting is a legacy Microsoft framework that allows inter-process communication and remote method invocation. When exposed improperly, it can allow an attacker to send maliciously crafted requests that result in arbitrary code execution on the server. This vulnerability enables remote code execution (RCE) without requiring user interaction, but it does require low-level privileges (PR:L) and has a high attack complexity (AC:H), indicating that exploitation is not trivial but feasible under certain conditions. The CVSS 3.1 base score is 4.9, reflecting limited confidentiality and integrity impact (both low), no impact on availability, and a scope change (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability arises because the server exposes .NET Remoting endpoints that can be manipulated to inject and execute arbitrary code, which could lead to unauthorized access, data manipulation, or lateral movement within the affected environment. Given the nature of the product—Project Center Server, which is used for project information management in architecture, engineering, and construction sectors—the exposure of such a vulnerability could compromise sensitive project data and workflows.
Potential Impact
For European organizations, the impact of CVE-2024-32499 could be significant, especially for those in the architecture, engineering, and construction (AEC) industries that rely on Newforma Project Center Server for project collaboration and document management. Successful exploitation could lead to unauthorized code execution on critical project management servers, potentially resulting in data breaches, manipulation of project documentation, disruption of project workflows, and exposure of intellectual property. Although the vulnerability does not directly impact availability, the integrity and confidentiality of project data could be compromised, affecting contractual obligations and regulatory compliance (e.g., GDPR). The medium CVSS score and the requirement for low privileges and high attack complexity suggest that while exploitation is not trivial, motivated attackers with some access could leverage this vulnerability to escalate privileges or move laterally within networks. This risk is heightened in environments where network segmentation or endpoint protections are weak. Additionally, the scope change indicates that the vulnerability could affect other components or systems beyond the Project Center Server itself, increasing potential damage.
Mitigation Recommendations
Given the absence of an official patch at the time of this report, European organizations should implement the following specific mitigations: 1) Immediately restrict network access to the Newforma Project Center Server, especially blocking inbound traffic to the .NET Remoting ports (commonly TCP 808 or custom ports) from untrusted networks. 2) Employ network segmentation to isolate the Project Center Server from general user networks and limit administrative access to trusted personnel only. 3) Monitor network traffic for unusual or malformed .NET Remoting requests indicative of exploitation attempts. 4) Review and harden server configurations to disable or limit .NET Remoting exposure if possible, or apply application-level controls to validate and sanitize incoming remote calls. 5) Enforce strict access controls and multi-factor authentication for accounts with low privileges that could be leveraged in exploitation. 6) Prepare incident response plans specific to this vulnerability, including forensic readiness to detect and respond to potential RCE attempts. 7) Engage with Newforma support channels to obtain patches or workarounds as soon as they become available and prioritize timely application of updates. 8) Conduct internal audits to identify all instances of Project Center Server deployments to ensure comprehensive coverage of mitigation efforts.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2024-32499: CWE-94 Improper Control of Generation of Code ('Code Injection') in Newforma Project Center Server
Description
Newforma Project Center Server through 2023.3.0.32259 allows remote code execution because .NET Remoting is exposed.
AI-Powered Analysis
Technical Analysis
CVE-2024-32499 is a medium-severity vulnerability affecting Newforma Project Center Server versions up to 2023.3.0.32259. The root cause is improper control of code generation (CWE-94), specifically due to the exposure of .NET Remoting interfaces. .NET Remoting is a legacy Microsoft framework that allows inter-process communication and remote method invocation. When exposed improperly, it can allow an attacker to send maliciously crafted requests that result in arbitrary code execution on the server. This vulnerability enables remote code execution (RCE) without requiring user interaction, but it does require low-level privileges (PR:L) and has a high attack complexity (AC:H), indicating that exploitation is not trivial but feasible under certain conditions. The CVSS 3.1 base score is 4.9, reflecting limited confidentiality and integrity impact (both low), no impact on availability, and a scope change (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability arises because the server exposes .NET Remoting endpoints that can be manipulated to inject and execute arbitrary code, which could lead to unauthorized access, data manipulation, or lateral movement within the affected environment. Given the nature of the product—Project Center Server, which is used for project information management in architecture, engineering, and construction sectors—the exposure of such a vulnerability could compromise sensitive project data and workflows.
Potential Impact
For European organizations, the impact of CVE-2024-32499 could be significant, especially for those in the architecture, engineering, and construction (AEC) industries that rely on Newforma Project Center Server for project collaboration and document management. Successful exploitation could lead to unauthorized code execution on critical project management servers, potentially resulting in data breaches, manipulation of project documentation, disruption of project workflows, and exposure of intellectual property. Although the vulnerability does not directly impact availability, the integrity and confidentiality of project data could be compromised, affecting contractual obligations and regulatory compliance (e.g., GDPR). The medium CVSS score and the requirement for low privileges and high attack complexity suggest that while exploitation is not trivial, motivated attackers with some access could leverage this vulnerability to escalate privileges or move laterally within networks. This risk is heightened in environments where network segmentation or endpoint protections are weak. Additionally, the scope change indicates that the vulnerability could affect other components or systems beyond the Project Center Server itself, increasing potential damage.
Mitigation Recommendations
Given the absence of an official patch at the time of this report, European organizations should implement the following specific mitigations: 1) Immediately restrict network access to the Newforma Project Center Server, especially blocking inbound traffic to the .NET Remoting ports (commonly TCP 808 or custom ports) from untrusted networks. 2) Employ network segmentation to isolate the Project Center Server from general user networks and limit administrative access to trusted personnel only. 3) Monitor network traffic for unusual or malformed .NET Remoting requests indicative of exploitation attempts. 4) Review and harden server configurations to disable or limit .NET Remoting exposure if possible, or apply application-level controls to validate and sanitize incoming remote calls. 5) Enforce strict access controls and multi-factor authentication for accounts with low privileges that could be leveraged in exploitation. 6) Prepare incident response plans specific to this vulnerability, including forensic readiness to detect and respond to potential RCE attempts. 7) Engage with Newforma support channels to obtain patches or workarounds as soon as they become available and prioritize timely application of updates. 8) Conduct internal audits to identify all instances of Project Center Server deployments to ensure comprehensive coverage of mitigation efforts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-04-15T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983dc4522896dcbef5ed
Added to database: 5/21/2025, 9:09:17 AM
Last enriched: 6/24/2025, 8:37:48 PM
Last updated: 7/30/2025, 9:40:11 PM
Views: 32
Related Threats
CVE-2025-7353: CWE-1188: Initialization of a Resource with an Insecure Default in Rockwell Automation 1756-EN2T/D
CriticalCVE-2025-55675: CWE-285 Improper Authorization in Apache Software Foundation Apache Superset
MediumCVE-2025-55674: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Apache Software Foundation Apache Superset
MediumCVE-2025-55673: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Apache Software Foundation Apache Superset
MediumCVE-2025-55672: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in Apache Software Foundation Apache Superset
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.