CVE-2025-35050: CWE-502 Deserialization of Untrusted Data in Newforma Project Center
CVE-2025-35050 is a critical remote code execution vulnerability in Newforma Project Center's Info Exchange (NIX) component. It arises from unsafe deserialization of untrusted . NET data sent to the '/remoteweb/remote. rem' endpoint, which is accessible without authentication. Exploiting this flaw allows attackers to execute arbitrary code with 'NT AUTHORITY\NetworkService' privileges, potentially compromising both NIX and associated Project Center Server systems. The vulnerability affects all versions including 2024. 3 and has a CVSS 4. 0 score of 9. 3, indicating high severity. No public exploits are known yet, but the attack surface is significant due to network accessibility and lack of authentication.
AI Analysis
Technical Summary
CVE-2025-35050 is a critical vulnerability classified under CWE-502 (Deserialization of Untrusted Data) and CWE-306 (Missing Authentication for Critical Function). It affects Newforma Project Center's Info Exchange (NIX) component, which accepts serialized .NET objects via the '/remoteweb/remote.rem' HTTP endpoint. This endpoint does not require authentication and processes incoming serialized data insecurely, allowing a remote attacker to craft malicious serialized payloads that, when deserialized by the server, lead to arbitrary code execution. The code runs with 'NT AUTHORITY\NetworkService' privileges, a powerful local service account, enabling attackers to execute system-level commands, install malware, or pivot to other internal systems. The vulnerability also threatens the associated Project Center Server (NPCS) because a compromised NIX system can be leveraged to attack NPCS. The vulnerability affects all versions including 2024.3, and was published on October 9, 2025. The CVSS 4.0 score of 9.3 reflects its critical nature, with attack vector being network-based, no authentication or user interaction required, and high impact on confidentiality, integrity, and availability. Although no known exploits are publicly reported yet, the ease of exploitation and severity warrant immediate mitigation. Recommended mitigation includes restricting access to the vulnerable endpoint, for example by using IIS URL Rewrite Module to limit network exposure, and monitoring for suspicious activity. Vendors should prioritize releasing patches or updates to fix the unsafe deserialization logic.
Potential Impact
For European organizations, this vulnerability poses a severe risk due to the potential for remote, unauthenticated attackers to gain code execution on critical project management infrastructure. Given that Newforma Project Center is widely used in architecture, engineering, and construction industries, which are significant sectors in Europe, exploitation could lead to unauthorized access to sensitive project data, intellectual property theft, disruption of project workflows, and lateral movement within corporate networks. The elevated privileges ('NT AUTHORITY\NetworkService') allow attackers to execute system-level commands, potentially leading to full system compromise, data destruction, or ransomware deployment. Additionally, the ability to pivot from NIX to the Project Center Server increases the attack surface and potential damage. The impact extends to operational continuity, regulatory compliance (e.g., GDPR), and reputational damage. Organizations relying on Newforma products without proper network segmentation or endpoint access controls are particularly vulnerable. The lack of authentication on the vulnerable endpoint exacerbates the risk, making exploitation feasible from any network location with access.
Mitigation Recommendations
1. Immediately restrict network access to the '/remoteweb/remote.rem' endpoint by implementing access control rules at the web server level, such as using the IIS URL Rewrite Module to block or limit requests to trusted IP addresses only. 2. Employ network segmentation to isolate Newforma Project Center servers from untrusted networks, including the internet and less secure internal segments. 3. Monitor network traffic and server logs for unusual or unexpected serialized .NET payloads targeting the vulnerable endpoint. 4. Engage with Newforma for any available patches or updates addressing this vulnerability and apply them promptly once released. 5. Implement application-layer firewalls or web application firewalls (WAFs) with custom rules to detect and block malicious deserialization attempts. 6. Conduct internal audits of all systems interacting with NIX and NPCS to identify potential lateral movement paths and strengthen endpoint security. 7. Educate IT and security teams about this vulnerability to ensure rapid detection and response to any exploitation attempts. 8. Consider temporary disabling or limiting the use of Info Exchange features if feasible until a patch is applied.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2025-35050: CWE-502 Deserialization of Untrusted Data in Newforma Project Center
Description
CVE-2025-35050 is a critical remote code execution vulnerability in Newforma Project Center's Info Exchange (NIX) component. It arises from unsafe deserialization of untrusted . NET data sent to the '/remoteweb/remote. rem' endpoint, which is accessible without authentication. Exploiting this flaw allows attackers to execute arbitrary code with 'NT AUTHORITY\NetworkService' privileges, potentially compromising both NIX and associated Project Center Server systems. The vulnerability affects all versions including 2024. 3 and has a CVSS 4. 0 score of 9. 3, indicating high severity. No public exploits are known yet, but the attack surface is significant due to network accessibility and lack of authentication.
AI-Powered Analysis
Technical Analysis
CVE-2025-35050 is a critical vulnerability classified under CWE-502 (Deserialization of Untrusted Data) and CWE-306 (Missing Authentication for Critical Function). It affects Newforma Project Center's Info Exchange (NIX) component, which accepts serialized .NET objects via the '/remoteweb/remote.rem' HTTP endpoint. This endpoint does not require authentication and processes incoming serialized data insecurely, allowing a remote attacker to craft malicious serialized payloads that, when deserialized by the server, lead to arbitrary code execution. The code runs with 'NT AUTHORITY\NetworkService' privileges, a powerful local service account, enabling attackers to execute system-level commands, install malware, or pivot to other internal systems. The vulnerability also threatens the associated Project Center Server (NPCS) because a compromised NIX system can be leveraged to attack NPCS. The vulnerability affects all versions including 2024.3, and was published on October 9, 2025. The CVSS 4.0 score of 9.3 reflects its critical nature, with attack vector being network-based, no authentication or user interaction required, and high impact on confidentiality, integrity, and availability. Although no known exploits are publicly reported yet, the ease of exploitation and severity warrant immediate mitigation. Recommended mitigation includes restricting access to the vulnerable endpoint, for example by using IIS URL Rewrite Module to limit network exposure, and monitoring for suspicious activity. Vendors should prioritize releasing patches or updates to fix the unsafe deserialization logic.
Potential Impact
For European organizations, this vulnerability poses a severe risk due to the potential for remote, unauthenticated attackers to gain code execution on critical project management infrastructure. Given that Newforma Project Center is widely used in architecture, engineering, and construction industries, which are significant sectors in Europe, exploitation could lead to unauthorized access to sensitive project data, intellectual property theft, disruption of project workflows, and lateral movement within corporate networks. The elevated privileges ('NT AUTHORITY\NetworkService') allow attackers to execute system-level commands, potentially leading to full system compromise, data destruction, or ransomware deployment. Additionally, the ability to pivot from NIX to the Project Center Server increases the attack surface and potential damage. The impact extends to operational continuity, regulatory compliance (e.g., GDPR), and reputational damage. Organizations relying on Newforma products without proper network segmentation or endpoint access controls are particularly vulnerable. The lack of authentication on the vulnerable endpoint exacerbates the risk, making exploitation feasible from any network location with access.
Mitigation Recommendations
1. Immediately restrict network access to the '/remoteweb/remote.rem' endpoint by implementing access control rules at the web server level, such as using the IIS URL Rewrite Module to block or limit requests to trusted IP addresses only. 2. Employ network segmentation to isolate Newforma Project Center servers from untrusted networks, including the internet and less secure internal segments. 3. Monitor network traffic and server logs for unusual or unexpected serialized .NET payloads targeting the vulnerable endpoint. 4. Engage with Newforma for any available patches or updates addressing this vulnerability and apply them promptly once released. 5. Implement application-layer firewalls or web application firewalls (WAFs) with custom rules to detect and block malicious deserialization attempts. 6. Conduct internal audits of all systems interacting with NIX and NPCS to identify potential lateral movement paths and strengthen endpoint security. 7. Educate IT and security teams about this vulnerability to ensure rapid detection and response to any exploitation attempts. 8. Consider temporary disabling or limiting the use of Info Exchange features if feasible until a patch is applied.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- cisa-cg
- Date Reserved
- 2025-04-15T20:56:24.405Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68e81d26ba0e608b4fac941c
Added to database: 10/9/2025, 8:37:58 PM
Last enriched: 10/17/2025, 5:17:20 AM
Last updated: 12/4/2025, 6:20:17 PM
Views: 200
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9127: CWE-116 Improper Encoding or Escaping of Output in Pure Storage PX Enterprise
HighCVE-2025-63363: n/a
UnknownCVE-2025-14012: SQL Injection in JIZHICMS
MediumCVE-2025-14011: SQL Injection in JIZHICMS
MediumCVE-2025-66373: n/a
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.