CVE-2025-35050: CWE-502 Deserialization of Untrusted Data in Newforma Project Center
Newforma Info Exchange (NIX) accepts serialized .NET data via the '/remoteweb/remote.rem' endpoint, allowing a remote, unauthenticated attacker to execute arbitrary code with 'NT AUTHORITY\NetworkService' privileges. The vulnerable endpoint is used by Newforma Project Center Server (NPCS), so a compromised NIX system can be used to attack an associated NPCS system. To mitigate this vulnerability, restrict network access to the '/remoteweb/remote.rem' endpoint, for example using the IIS URL Rewrite Module.
AI Analysis
Technical Summary
CVE-2025-35050 is a critical vulnerability affecting Newforma Project Center, specifically its Newforma Info Exchange (NIX) component. The issue stems from the deserialization of untrusted .NET serialized data submitted to the '/remoteweb/remote.rem' endpoint. Deserialization vulnerabilities (CWE-502) occur when applications deserialize data without sufficient validation, allowing attackers to craft malicious payloads that execute arbitrary code during the deserialization process. In this case, the endpoint accepts serialized data without authentication or authorization, enabling remote, unauthenticated attackers to exploit the flaw. Successful exploitation grants code execution with NT AUTHORITY\NetworkService privileges, a powerful local service account on Windows systems. This elevated privilege level allows attackers to compromise the NIX system and pivot to attack the associated Newforma Project Center Server (NPCS), potentially leading to full system compromise. The vulnerability affects all versions including 2024.3 and earlier. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) reflects network attack vector, low attack complexity, no authentication or user interaction required, and high impact on confidentiality, integrity, and availability. Although no public exploits are known yet, the critical nature and ease of exploitation make this a high-risk vulnerability. Mitigation recommendations include restricting access to the vulnerable endpoint, for example by using IIS URL Rewrite Module to limit network exposure, and monitoring for suspicious activity. Vendors and users should prioritize patching once available.
Potential Impact
For European organizations, this vulnerability poses a severe risk due to the critical nature of the affected software in project management and construction sectors. Exploitation can lead to unauthorized remote code execution, resulting in data breaches, operational disruption, and lateral movement within networks. Confidential project data, intellectual property, and client information could be exposed or altered, damaging business reputation and compliance posture, especially under GDPR. The ability to compromise both NIX and NPCS systems increases the attack surface and potential damage. Organizations relying on Newforma Project Center for managing large-scale projects may face significant downtime and financial losses if exploited. The unauthenticated nature of the vulnerability means attackers can exploit it without prior access, increasing the likelihood of attacks. Given the critical CVSS score and privilege level gained, the impact on confidentiality, integrity, and availability is high.
Mitigation Recommendations
1. Immediately restrict network access to the '/remoteweb/remote.rem' endpoint by implementing firewall rules or network segmentation to limit exposure only to trusted hosts. 2. Use IIS URL Rewrite Module or equivalent web server controls to block or filter requests to the vulnerable endpoint from untrusted sources. 3. Monitor logs and network traffic for unusual or unexpected requests targeting the '/remoteweb/remote.rem' endpoint. 4. Coordinate with Newforma for official patches or updates and apply them promptly once released. 5. Conduct internal audits of systems running Newforma Project Center to identify and isolate vulnerable instances. 6. Employ application-layer firewalls or intrusion prevention systems with custom rules to detect and block malicious serialized payloads. 7. Educate IT and security teams about the vulnerability to ensure rapid response to any indicators of compromise. 8. Consider deploying endpoint detection and response (EDR) solutions to detect post-exploitation activities related to NT AUTHORITY\NetworkService privilege misuse.
Affected Countries
United Kingdom, Germany, France, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Austria
CVE-2025-35050: CWE-502 Deserialization of Untrusted Data in Newforma Project Center
Description
Newforma Info Exchange (NIX) accepts serialized .NET data via the '/remoteweb/remote.rem' endpoint, allowing a remote, unauthenticated attacker to execute arbitrary code with 'NT AUTHORITY\NetworkService' privileges. The vulnerable endpoint is used by Newforma Project Center Server (NPCS), so a compromised NIX system can be used to attack an associated NPCS system. To mitigate this vulnerability, restrict network access to the '/remoteweb/remote.rem' endpoint, for example using the IIS URL Rewrite Module.
AI-Powered Analysis
Technical Analysis
CVE-2025-35050 is a critical vulnerability affecting Newforma Project Center, specifically its Newforma Info Exchange (NIX) component. The issue stems from the deserialization of untrusted .NET serialized data submitted to the '/remoteweb/remote.rem' endpoint. Deserialization vulnerabilities (CWE-502) occur when applications deserialize data without sufficient validation, allowing attackers to craft malicious payloads that execute arbitrary code during the deserialization process. In this case, the endpoint accepts serialized data without authentication or authorization, enabling remote, unauthenticated attackers to exploit the flaw. Successful exploitation grants code execution with NT AUTHORITY\NetworkService privileges, a powerful local service account on Windows systems. This elevated privilege level allows attackers to compromise the NIX system and pivot to attack the associated Newforma Project Center Server (NPCS), potentially leading to full system compromise. The vulnerability affects all versions including 2024.3 and earlier. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) reflects network attack vector, low attack complexity, no authentication or user interaction required, and high impact on confidentiality, integrity, and availability. Although no public exploits are known yet, the critical nature and ease of exploitation make this a high-risk vulnerability. Mitigation recommendations include restricting access to the vulnerable endpoint, for example by using IIS URL Rewrite Module to limit network exposure, and monitoring for suspicious activity. Vendors and users should prioritize patching once available.
Potential Impact
For European organizations, this vulnerability poses a severe risk due to the critical nature of the affected software in project management and construction sectors. Exploitation can lead to unauthorized remote code execution, resulting in data breaches, operational disruption, and lateral movement within networks. Confidential project data, intellectual property, and client information could be exposed or altered, damaging business reputation and compliance posture, especially under GDPR. The ability to compromise both NIX and NPCS systems increases the attack surface and potential damage. Organizations relying on Newforma Project Center for managing large-scale projects may face significant downtime and financial losses if exploited. The unauthenticated nature of the vulnerability means attackers can exploit it without prior access, increasing the likelihood of attacks. Given the critical CVSS score and privilege level gained, the impact on confidentiality, integrity, and availability is high.
Mitigation Recommendations
1. Immediately restrict network access to the '/remoteweb/remote.rem' endpoint by implementing firewall rules or network segmentation to limit exposure only to trusted hosts. 2. Use IIS URL Rewrite Module or equivalent web server controls to block or filter requests to the vulnerable endpoint from untrusted sources. 3. Monitor logs and network traffic for unusual or unexpected requests targeting the '/remoteweb/remote.rem' endpoint. 4. Coordinate with Newforma for official patches or updates and apply them promptly once released. 5. Conduct internal audits of systems running Newforma Project Center to identify and isolate vulnerable instances. 6. Employ application-layer firewalls or intrusion prevention systems with custom rules to detect and block malicious serialized payloads. 7. Educate IT and security teams about the vulnerability to ensure rapid response to any indicators of compromise. 8. Consider deploying endpoint detection and response (EDR) solutions to detect post-exploitation activities related to NT AUTHORITY\NetworkService privilege misuse.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- cisa-cg
- Date Reserved
- 2025-04-15T20:56:24.405Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68e81d26ba0e608b4fac941c
Added to database: 10/9/2025, 8:37:58 PM
Last enriched: 10/9/2025, 8:53:48 PM
Last updated: 10/11/2025, 1:34:20 PM
Views: 107
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11601: SQL Injection in SourceCodester Online Student Result System
MediumCVE-2025-11600: SQL Injection in code-projects Simple Food Ordering System
MediumCVE-2025-11597: SQL Injection in code-projects E-Commerce Website
MediumCVE-2025-11596: SQL Injection in code-projects E-Commerce Website
MediumCVE-2025-58301: CWE-121 Stack-based Buffer Overflow in Huawei HarmonyOS
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.