CVE-2025-35057: CWE-294 Authentication Bypass by Capture-replay in Newforma Project Center
CVE-2025-35057 is an authentication bypass vulnerability in Newforma Project Center's Info Exchange component. It allows a remote, unauthenticated attacker to trigger the application to initiate an SMB connection to an attacker-controlled server, capturing the NTLMv2 hash of the service account. This vulnerability stems from improper authentication controls (CWE-294) in the '/RemoteWeb/IntegrationServices. ashx' endpoint. Exploitation requires no user interaction and can lead to credential theft, potentially enabling lateral movement within networks. The CVSS 4. 0 score is 6. 0 (medium severity), reflecting the moderate impact and ease of exploitation with some privileges. European organizations using Newforma Project Center, especially in architecture, engineering, and construction sectors, should be vigilant. Mitigations include network segmentation, SMB traffic monitoring, and restricting outbound SMB connections.
AI Analysis
Technical Summary
CVE-2025-35057 is a medium-severity authentication bypass vulnerability identified in Newforma Project Center's Info Exchange (NIX) component, specifically in the '/RemoteWeb/IntegrationServices.ashx' endpoint. The vulnerability arises due to improper authentication validation (CWE-294), allowing a remote attacker to cause the NIX service to initiate an SMB connection to an attacker-controlled system without requiring authentication or user interaction. When this SMB connection is made, the attacker can capture the NTLMv2 hash of the NIX service account, which can then be subjected to offline cracking attempts or relay attacks to escalate privileges or move laterally within the victim's network. The vulnerability does not require prior authentication but does require the attacker to induce the SMB connection, which can be done remotely. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), partial attack type (AT:P), low privileges required (PR:L), no user interaction (UI:N), and high impact on confidentiality (VC:H) but no impact on integrity or availability. No patches or known exploits are currently available, but the vulnerability's nature suggests it could be leveraged in targeted attacks against organizations using Newforma Project Center, particularly those in sectors relying on project collaboration tools. The vulnerability's exploitation could lead to credential compromise and subsequent unauthorized access to sensitive project data or internal systems.
Potential Impact
For European organizations, especially those in architecture, engineering, construction, and project management sectors that use Newforma Project Center, this vulnerability poses a significant risk of credential theft and unauthorized access. The capture of NTLMv2 hashes can enable attackers to perform offline password cracking or relay attacks, potentially leading to lateral movement within corporate networks. This could result in exposure of sensitive project data, intellectual property theft, disruption of project workflows, and damage to business reputation. Given the collaborative nature of these industries and the reliance on integrated project management tools, exploitation could have cascading effects on multiple stakeholders. Additionally, organizations with weak network segmentation or insufficient monitoring of SMB traffic are at higher risk. The medium CVSS score reflects moderate impact, but the ease of exploitation and lack of required user interaction increase the threat's seriousness. European entities involved in critical infrastructure projects may face heightened risks due to the strategic value of their data.
Mitigation Recommendations
Organizations should implement strict network segmentation to isolate Newforma Project Center servers from untrusted networks and limit SMB traffic to only necessary internal systems. Deploy network monitoring and intrusion detection systems to detect anomalous SMB connection attempts, especially outbound connections to unknown IP addresses. Enforce strong access controls and ensure the NIX service account uses a complex, regularly rotated password to reduce the risk of successful hash cracking. Disable or restrict SMB protocol usage where not essential, particularly SMBv1, and consider SMB signing to prevent relay attacks. Apply the principle of least privilege to service accounts and audit their usage regularly. Since no patches are currently available, consider deploying web application firewalls (WAFs) to block suspicious requests targeting the vulnerable endpoint. Educate IT and security teams about this vulnerability to recognize potential exploitation attempts. Finally, maintain up-to-date backups and incident response plans tailored to credential theft scenarios.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands, Spain, Sweden, Belgium
CVE-2025-35057: CWE-294 Authentication Bypass by Capture-replay in Newforma Project Center
Description
CVE-2025-35057 is an authentication bypass vulnerability in Newforma Project Center's Info Exchange component. It allows a remote, unauthenticated attacker to trigger the application to initiate an SMB connection to an attacker-controlled server, capturing the NTLMv2 hash of the service account. This vulnerability stems from improper authentication controls (CWE-294) in the '/RemoteWeb/IntegrationServices. ashx' endpoint. Exploitation requires no user interaction and can lead to credential theft, potentially enabling lateral movement within networks. The CVSS 4. 0 score is 6. 0 (medium severity), reflecting the moderate impact and ease of exploitation with some privileges. European organizations using Newforma Project Center, especially in architecture, engineering, and construction sectors, should be vigilant. Mitigations include network segmentation, SMB traffic monitoring, and restricting outbound SMB connections.
AI-Powered Analysis
Technical Analysis
CVE-2025-35057 is a medium-severity authentication bypass vulnerability identified in Newforma Project Center's Info Exchange (NIX) component, specifically in the '/RemoteWeb/IntegrationServices.ashx' endpoint. The vulnerability arises due to improper authentication validation (CWE-294), allowing a remote attacker to cause the NIX service to initiate an SMB connection to an attacker-controlled system without requiring authentication or user interaction. When this SMB connection is made, the attacker can capture the NTLMv2 hash of the NIX service account, which can then be subjected to offline cracking attempts or relay attacks to escalate privileges or move laterally within the victim's network. The vulnerability does not require prior authentication but does require the attacker to induce the SMB connection, which can be done remotely. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), partial attack type (AT:P), low privileges required (PR:L), no user interaction (UI:N), and high impact on confidentiality (VC:H) but no impact on integrity or availability. No patches or known exploits are currently available, but the vulnerability's nature suggests it could be leveraged in targeted attacks against organizations using Newforma Project Center, particularly those in sectors relying on project collaboration tools. The vulnerability's exploitation could lead to credential compromise and subsequent unauthorized access to sensitive project data or internal systems.
Potential Impact
For European organizations, especially those in architecture, engineering, construction, and project management sectors that use Newforma Project Center, this vulnerability poses a significant risk of credential theft and unauthorized access. The capture of NTLMv2 hashes can enable attackers to perform offline password cracking or relay attacks, potentially leading to lateral movement within corporate networks. This could result in exposure of sensitive project data, intellectual property theft, disruption of project workflows, and damage to business reputation. Given the collaborative nature of these industries and the reliance on integrated project management tools, exploitation could have cascading effects on multiple stakeholders. Additionally, organizations with weak network segmentation or insufficient monitoring of SMB traffic are at higher risk. The medium CVSS score reflects moderate impact, but the ease of exploitation and lack of required user interaction increase the threat's seriousness. European entities involved in critical infrastructure projects may face heightened risks due to the strategic value of their data.
Mitigation Recommendations
Organizations should implement strict network segmentation to isolate Newforma Project Center servers from untrusted networks and limit SMB traffic to only necessary internal systems. Deploy network monitoring and intrusion detection systems to detect anomalous SMB connection attempts, especially outbound connections to unknown IP addresses. Enforce strong access controls and ensure the NIX service account uses a complex, regularly rotated password to reduce the risk of successful hash cracking. Disable or restrict SMB protocol usage where not essential, particularly SMBv1, and consider SMB signing to prevent relay attacks. Apply the principle of least privilege to service accounts and audit their usage regularly. Since no patches are currently available, consider deploying web application firewalls (WAFs) to block suspicious requests targeting the vulnerable endpoint. Educate IT and security teams about this vulnerability to recognize potential exploitation attempts. Finally, maintain up-to-date backups and incident response plans tailored to credential theft scenarios.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- cisa-cg
- Date Reserved
- 2025-04-15T20:56:24.406Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68e81d26ba0e608b4fac943e
Added to database: 10/9/2025, 8:37:58 PM
Last enriched: 10/17/2025, 5:18:44 AM
Last updated: 12/4/2025, 7:35:34 PM
Views: 43
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-65806: n/a
UnknownCVE-2025-12097: CWE-23- Relative Path Traversal in NI LabVIEW
HighCVE-2025-55182 vulnerability in React and Next.js | Kaspersky official blog
MediumIndia Rolls Back Order to Preinstall Cybersecurity App on Smartphones
MediumCVE-2025-65945: CWE-347: Improper Verification of Cryptographic Signature in auth0 node-jws
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.