CVE-2025-35054: CWE-922 Insecure Storage of Sensitive Information in Newforma Project Center
CVE-2025-35054 is a medium severity vulnerability in Newforma Project Center where sensitive credentials are stored insecurely in the Windows registry. Although the credentials are encrypted, the encryption key is stored alongside them, allowing any authenticated user with access to the registry location to retrieve both and decrypt the credentials. If these credentials are Active Directory accounts, attackers could leverage them to move laterally within an organization’s network and access additional systems and resources. The vulnerability affects all versions including 2024. 3 and requires local authenticated access but no user interaction. No known exploits are currently reported in the wild. European organizations using Newforma Project Center should prioritize restricting registry access and consider credential rotation and monitoring to mitigate risk. Countries with significant construction, architecture, and engineering sectors using Newforma products are most likely to be impacted. The CVSS score of 5. 3 reflects moderate risk due to the need for authenticated access and limited scope of exploitation.
AI Analysis
Technical Summary
CVE-2025-35054 is a vulnerability identified in Newforma Project Center, specifically in the Newforma Info Exchange (NIX) component. The issue arises from the insecure storage of sensitive credentials in the Windows registry under the path 'HKLM\Software\WOW6432Node\Newforma\<version>\Credentials'. While the credentials are encrypted, the encryption key is stored in the same registry location, effectively nullifying the protection offered by encryption. This design flaw allows any user with authenticated access to the system and registry to retrieve both the encrypted credentials and the key, enabling decryption of the stored credentials. Since these credentials often include Active Directory accounts used to configure NPCS (Newforma Project Center Server), an attacker gaining access could leverage these credentials to move laterally within the network, accessing additional systems and sensitive resources. The vulnerability requires local authenticated access but does not require user interaction, and the attack vector is local (AV:L). The vulnerability affects all versions of Newforma Project Center, including version 2024.3. The CVSS v3.1 base score is 5.3, indicating medium severity, with impacts on confidentiality, integrity, and availability rated as low to medium. No patches or exploits are currently reported, but the vulnerability poses a significant risk in environments where multiple users have registry access and where Active Directory credentials are stored. The weakness is categorized under CWE-922 (Insecure Storage of Sensitive Information), CWE-522 (Insufficiently Protected Credentials), and CWE-257 (Storing Passwords in a Recoverable Format).
Potential Impact
For European organizations, especially those in architecture, engineering, and construction sectors where Newforma Project Center is commonly used, this vulnerability could lead to unauthorized access to sensitive project data and internal systems. If attackers obtain Active Directory credentials, they could perform lateral movement, escalate privileges, and potentially access critical infrastructure or intellectual property. This could result in data breaches, operational disruptions, and reputational damage. The impact is heightened in organizations with multiple users having local authenticated access to systems running Newforma Project Center. Additionally, regulatory compliance risks arise under GDPR if personal or sensitive data is compromised. The medium severity score reflects that while exploitation requires authenticated access, the potential for privilege escalation and lateral movement within enterprise networks makes this a significant threat. Organizations with complex Active Directory environments and interconnected systems are particularly at risk.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately restrict access to the affected registry keys to only highly trusted administrators and service accounts. Implement strict access control policies and audit registry access regularly to detect unauthorized attempts. Rotate and reset any Active Directory credentials stored in Newforma Project Center to invalidate compromised credentials. Consider isolating systems running Newforma Project Center from general user workstations to limit authenticated access. Employ endpoint detection and response (EDR) tools to monitor for suspicious registry access and lateral movement activities. Engage with Newforma for any forthcoming patches or updates and apply them promptly once available. Additionally, review and harden credential storage practices within the organization, avoiding storing sensitive credentials in recoverable formats. Conduct security awareness training to ensure users understand the risks of credential exposure. Finally, implement network segmentation to limit the impact of any credential compromise.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-35054: CWE-922 Insecure Storage of Sensitive Information in Newforma Project Center
Description
CVE-2025-35054 is a medium severity vulnerability in Newforma Project Center where sensitive credentials are stored insecurely in the Windows registry. Although the credentials are encrypted, the encryption key is stored alongside them, allowing any authenticated user with access to the registry location to retrieve both and decrypt the credentials. If these credentials are Active Directory accounts, attackers could leverage them to move laterally within an organization’s network and access additional systems and resources. The vulnerability affects all versions including 2024. 3 and requires local authenticated access but no user interaction. No known exploits are currently reported in the wild. European organizations using Newforma Project Center should prioritize restricting registry access and consider credential rotation and monitoring to mitigate risk. Countries with significant construction, architecture, and engineering sectors using Newforma products are most likely to be impacted. The CVSS score of 5. 3 reflects moderate risk due to the need for authenticated access and limited scope of exploitation.
AI-Powered Analysis
Technical Analysis
CVE-2025-35054 is a vulnerability identified in Newforma Project Center, specifically in the Newforma Info Exchange (NIX) component. The issue arises from the insecure storage of sensitive credentials in the Windows registry under the path 'HKLM\Software\WOW6432Node\Newforma\<version>\Credentials'. While the credentials are encrypted, the encryption key is stored in the same registry location, effectively nullifying the protection offered by encryption. This design flaw allows any user with authenticated access to the system and registry to retrieve both the encrypted credentials and the key, enabling decryption of the stored credentials. Since these credentials often include Active Directory accounts used to configure NPCS (Newforma Project Center Server), an attacker gaining access could leverage these credentials to move laterally within the network, accessing additional systems and sensitive resources. The vulnerability requires local authenticated access but does not require user interaction, and the attack vector is local (AV:L). The vulnerability affects all versions of Newforma Project Center, including version 2024.3. The CVSS v3.1 base score is 5.3, indicating medium severity, with impacts on confidentiality, integrity, and availability rated as low to medium. No patches or exploits are currently reported, but the vulnerability poses a significant risk in environments where multiple users have registry access and where Active Directory credentials are stored. The weakness is categorized under CWE-922 (Insecure Storage of Sensitive Information), CWE-522 (Insufficiently Protected Credentials), and CWE-257 (Storing Passwords in a Recoverable Format).
Potential Impact
For European organizations, especially those in architecture, engineering, and construction sectors where Newforma Project Center is commonly used, this vulnerability could lead to unauthorized access to sensitive project data and internal systems. If attackers obtain Active Directory credentials, they could perform lateral movement, escalate privileges, and potentially access critical infrastructure or intellectual property. This could result in data breaches, operational disruptions, and reputational damage. The impact is heightened in organizations with multiple users having local authenticated access to systems running Newforma Project Center. Additionally, regulatory compliance risks arise under GDPR if personal or sensitive data is compromised. The medium severity score reflects that while exploitation requires authenticated access, the potential for privilege escalation and lateral movement within enterprise networks makes this a significant threat. Organizations with complex Active Directory environments and interconnected systems are particularly at risk.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately restrict access to the affected registry keys to only highly trusted administrators and service accounts. Implement strict access control policies and audit registry access regularly to detect unauthorized attempts. Rotate and reset any Active Directory credentials stored in Newforma Project Center to invalidate compromised credentials. Consider isolating systems running Newforma Project Center from general user workstations to limit authenticated access. Employ endpoint detection and response (EDR) tools to monitor for suspicious registry access and lateral movement activities. Engage with Newforma for any forthcoming patches or updates and apply them promptly once available. Additionally, review and harden credential storage practices within the organization, avoiding storing sensitive credentials in recoverable formats. Conduct security awareness training to ensure users understand the risks of credential exposure. Finally, implement network segmentation to limit the impact of any credential compromise.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- cisa-cg
- Date Reserved
- 2025-04-15T20:56:24.406Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e81d26ba0e608b4fac9430
Added to database: 10/9/2025, 8:37:58 PM
Last enriched: 10/17/2025, 5:18:12 AM
Last updated: 11/28/2025, 4:59:44 PM
Views: 34
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-23683
HighCVE-2024-23682: CWE-501 Trust Boundary Violation
HighCVE-2024-21908: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
MediumCVE-2023-30802: CWE-540: Inclusion of Sensitive Information in Source Code in Sangfor Net-Gen Application Firewall
MediumCVE-2025-12183: CWE-125 Out-of-bounds Read
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.