Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-35051: CWE-502 Deserialization of Untrusted Data in Newforma Project Center

0
Critical
VulnerabilityCVE-2025-35051cvecve-2025-35051cwe-502cwe-306
Published: Thu Oct 09 2025 (10/09/2025, 20:19:43 UTC)
Source: CVE Database V5
Vendor/Project: Newforma
Product: Project Center

Description

Newforma Project Center Server (NPCS) accepts serialized .NET data via the '/ProjectCenter.rem' endpoint on 9003/tcp, allowing a remote, unauthenticated attacker to execute arbitrary code with 'NT AUTHORITY\NetworkService' privileges. According to the recommended architecture, the vulnerable NPCS endpoint is only accessible on an internal network. To mitigate this vulnerability, restrict network access to NPCS.

AI-Powered Analysis

AILast updated: 10/09/2025, 20:53:36 UTC

Technical Analysis

CVE-2025-35051 is a critical vulnerability in Newforma Project Center Server (NPCS) that arises from unsafe deserialization of untrusted .NET serialized data sent to the '/ProjectCenter.rem' endpoint, which listens on TCP port 9003. This vulnerability is classified under CWE-502 (Deserialization of Untrusted Data) and CWE-306 (Missing Authentication for Critical Function). The flaw allows a remote attacker to send specially crafted serialized data to the NPCS server without any authentication, leading to arbitrary code execution with the privileges of the 'NT AUTHORITY\NetworkService' account. Given the high privileges of this account, successful exploitation can lead to full system compromise, including data theft, system manipulation, or disruption of services. The CVSS v3.1 score of 9.8 reflects the critical nature of this vulnerability, with an attack vector over the network, no required privileges, and no user interaction needed. The vulnerability affects all versions of Newforma Project Center, including the 2024.3 release. According to vendor architecture recommendations, the vulnerable endpoint should only be accessible on internal networks, which implies that external exposure significantly increases risk. No patches or public exploits are currently available, but the vulnerability's nature suggests it could be weaponized quickly once exploited in the wild. This vulnerability is particularly concerning for organizations relying on NPCS for project management in sectors like construction and engineering, where sensitive project data and operational continuity are critical.

Potential Impact

The impact of CVE-2025-35051 on European organizations could be severe. Exploitation allows unauthenticated remote attackers to execute arbitrary code on NPCS servers with 'NetworkService' privileges, potentially leading to full system compromise. Confidentiality is at risk as attackers could access sensitive project data, intellectual property, and client information managed by Newforma Project Center. Integrity could be compromised through unauthorized modification or deletion of project files and configurations, disrupting workflows and causing financial and reputational damage. Availability is also threatened, as attackers could disable the service or use the compromised server as a foothold for lateral movement within the internal network. European organizations in architecture, engineering, and construction sectors, which commonly use Newforma Project Center, may face operational disruptions and regulatory compliance issues, especially under GDPR if personal data is exposed. The internal network exposure requirement somewhat limits the attack surface, but insider threats or inadequate network segmentation could facilitate exploitation. The absence of known exploits currently provides a window for proactive mitigation, but the critical severity demands urgent attention.

Mitigation Recommendations

1. Immediately restrict network access to the NPCS server, ensuring that the '/ProjectCenter.rem' endpoint on TCP port 9003 is accessible only from trusted internal hosts and management consoles. 2. Implement strict network segmentation and firewall rules to isolate the NPCS server from general user networks and untrusted devices. 3. Monitor internal network traffic for unusual or unauthorized connections to port 9003, employing intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics for anomalous serialized .NET data. 4. Enforce least privilege principles on the NPCS server and related infrastructure to limit the impact of potential compromise. 5. Regularly audit and review access logs and system events on NPCS servers to detect early signs of exploitation attempts. 6. Engage with Newforma for updates on patches or security advisories and plan for immediate deployment once available. 7. Consider deploying application-layer gateways or proxies that can validate or block suspicious serialized data payloads if feasible. 8. Educate internal IT and security teams about the vulnerability and the importance of internal network security hygiene to prevent lateral movement. 9. As a longer-term measure, evaluate alternative project management solutions with stronger security postures if patching is delayed.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
cisa-cg
Date Reserved
2025-04-15T20:56:24.405Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e81d26ba0e608b4fac9422

Added to database: 10/9/2025, 8:37:58 PM

Last enriched: 10/9/2025, 8:53:36 PM

Last updated: 10/11/2025, 1:16:01 PM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats