Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-35050: CWE-502 Deserialization of Untrusted Data in Newforma Project Center

0
Critical
VulnerabilityCVE-2025-35050cvecve-2025-35050cwe-502cwe-306
Published: Thu Oct 09 2025 (10/09/2025, 20:19:12 UTC)
Source: CVE Database V5
Vendor/Project: Newforma
Product: Project Center

Description

CVE-2025-35050 is a critical remote code execution vulnerability in Newforma Project Center's Info Exchange (NIX) component. It arises from unsafe deserialization of untrusted . NET data sent to the '/remoteweb/remote. rem' endpoint, which is accessible without authentication. Exploiting this flaw allows attackers to execute arbitrary code with 'NT AUTHORITY\NetworkService' privileges, potentially compromising both NIX and associated Project Center Server systems. The vulnerability affects all versions including 2024. 3 and has a CVSS 4. 0 score of 9. 3, indicating high severity. No public exploits are known yet, but the attack surface is significant due to network accessibility and lack of authentication.

AI-Powered Analysis

AILast updated: 10/17/2025, 05:17:20 UTC

Technical Analysis

CVE-2025-35050 is a critical vulnerability classified under CWE-502 (Deserialization of Untrusted Data) and CWE-306 (Missing Authentication for Critical Function). It affects Newforma Project Center's Info Exchange (NIX) component, which accepts serialized .NET objects via the '/remoteweb/remote.rem' HTTP endpoint. This endpoint does not require authentication and processes incoming serialized data insecurely, allowing a remote attacker to craft malicious serialized payloads that, when deserialized by the server, lead to arbitrary code execution. The code runs with 'NT AUTHORITY\NetworkService' privileges, a powerful local service account, enabling attackers to execute system-level commands, install malware, or pivot to other internal systems. The vulnerability also threatens the associated Project Center Server (NPCS) because a compromised NIX system can be leveraged to attack NPCS. The vulnerability affects all versions including 2024.3, and was published on October 9, 2025. The CVSS 4.0 score of 9.3 reflects its critical nature, with attack vector being network-based, no authentication or user interaction required, and high impact on confidentiality, integrity, and availability. Although no known exploits are publicly reported yet, the ease of exploitation and severity warrant immediate mitigation. Recommended mitigation includes restricting access to the vulnerable endpoint, for example by using IIS URL Rewrite Module to limit network exposure, and monitoring for suspicious activity. Vendors should prioritize releasing patches or updates to fix the unsafe deserialization logic.

Potential Impact

For European organizations, this vulnerability poses a severe risk due to the potential for remote, unauthenticated attackers to gain code execution on critical project management infrastructure. Given that Newforma Project Center is widely used in architecture, engineering, and construction industries, which are significant sectors in Europe, exploitation could lead to unauthorized access to sensitive project data, intellectual property theft, disruption of project workflows, and lateral movement within corporate networks. The elevated privileges ('NT AUTHORITY\NetworkService') allow attackers to execute system-level commands, potentially leading to full system compromise, data destruction, or ransomware deployment. Additionally, the ability to pivot from NIX to the Project Center Server increases the attack surface and potential damage. The impact extends to operational continuity, regulatory compliance (e.g., GDPR), and reputational damage. Organizations relying on Newforma products without proper network segmentation or endpoint access controls are particularly vulnerable. The lack of authentication on the vulnerable endpoint exacerbates the risk, making exploitation feasible from any network location with access.

Mitigation Recommendations

1. Immediately restrict network access to the '/remoteweb/remote.rem' endpoint by implementing access control rules at the web server level, such as using the IIS URL Rewrite Module to block or limit requests to trusted IP addresses only. 2. Employ network segmentation to isolate Newforma Project Center servers from untrusted networks, including the internet and less secure internal segments. 3. Monitor network traffic and server logs for unusual or unexpected serialized .NET payloads targeting the vulnerable endpoint. 4. Engage with Newforma for any available patches or updates addressing this vulnerability and apply them promptly once released. 5. Implement application-layer firewalls or web application firewalls (WAFs) with custom rules to detect and block malicious deserialization attempts. 6. Conduct internal audits of all systems interacting with NIX and NPCS to identify potential lateral movement paths and strengthen endpoint security. 7. Educate IT and security teams about this vulnerability to ensure rapid detection and response to any exploitation attempts. 8. Consider temporary disabling or limiting the use of Info Exchange features if feasible until a patch is applied.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
cisa-cg
Date Reserved
2025-04-15T20:56:24.405Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e81d26ba0e608b4fac941c

Added to database: 10/9/2025, 8:37:58 PM

Last enriched: 10/17/2025, 5:17:20 AM

Last updated: 12/4/2025, 6:20:17 PM

Views: 200

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats