Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-35057: CWE-294 Authentication Bypass by Capture-replay in Newforma Project Center

0
Medium
VulnerabilityCVE-2025-35057cvecve-2025-35057cwe-294
Published: Thu Oct 09 2025 (10/09/2025, 20:21:29 UTC)
Source: CVE Database V5
Vendor/Project: Newforma
Product: Project Center

Description

CVE-2025-35057 is an authentication bypass vulnerability in Newforma Project Center's Info Exchange component. It allows a remote, unauthenticated attacker to trigger the application to initiate an SMB connection to an attacker-controlled server, capturing the NTLMv2 hash of the service account. This vulnerability stems from improper authentication controls (CWE-294) in the '/RemoteWeb/IntegrationServices. ashx' endpoint. Exploitation requires no user interaction and can lead to credential theft, potentially enabling lateral movement within networks. The CVSS 4. 0 score is 6. 0 (medium severity), reflecting the moderate impact and ease of exploitation with some privileges. European organizations using Newforma Project Center, especially in architecture, engineering, and construction sectors, should be vigilant. Mitigations include network segmentation, SMB traffic monitoring, and restricting outbound SMB connections.

AI-Powered Analysis

AILast updated: 10/17/2025, 05:18:44 UTC

Technical Analysis

CVE-2025-35057 is a medium-severity authentication bypass vulnerability identified in Newforma Project Center's Info Exchange (NIX) component, specifically in the '/RemoteWeb/IntegrationServices.ashx' endpoint. The vulnerability arises due to improper authentication validation (CWE-294), allowing a remote attacker to cause the NIX service to initiate an SMB connection to an attacker-controlled system without requiring authentication or user interaction. When this SMB connection is made, the attacker can capture the NTLMv2 hash of the NIX service account, which can then be subjected to offline cracking attempts or relay attacks to escalate privileges or move laterally within the victim's network. The vulnerability does not require prior authentication but does require the attacker to induce the SMB connection, which can be done remotely. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), partial attack type (AT:P), low privileges required (PR:L), no user interaction (UI:N), and high impact on confidentiality (VC:H) but no impact on integrity or availability. No patches or known exploits are currently available, but the vulnerability's nature suggests it could be leveraged in targeted attacks against organizations using Newforma Project Center, particularly those in sectors relying on project collaboration tools. The vulnerability's exploitation could lead to credential compromise and subsequent unauthorized access to sensitive project data or internal systems.

Potential Impact

For European organizations, especially those in architecture, engineering, construction, and project management sectors that use Newforma Project Center, this vulnerability poses a significant risk of credential theft and unauthorized access. The capture of NTLMv2 hashes can enable attackers to perform offline password cracking or relay attacks, potentially leading to lateral movement within corporate networks. This could result in exposure of sensitive project data, intellectual property theft, disruption of project workflows, and damage to business reputation. Given the collaborative nature of these industries and the reliance on integrated project management tools, exploitation could have cascading effects on multiple stakeholders. Additionally, organizations with weak network segmentation or insufficient monitoring of SMB traffic are at higher risk. The medium CVSS score reflects moderate impact, but the ease of exploitation and lack of required user interaction increase the threat's seriousness. European entities involved in critical infrastructure projects may face heightened risks due to the strategic value of their data.

Mitigation Recommendations

Organizations should implement strict network segmentation to isolate Newforma Project Center servers from untrusted networks and limit SMB traffic to only necessary internal systems. Deploy network monitoring and intrusion detection systems to detect anomalous SMB connection attempts, especially outbound connections to unknown IP addresses. Enforce strong access controls and ensure the NIX service account uses a complex, regularly rotated password to reduce the risk of successful hash cracking. Disable or restrict SMB protocol usage where not essential, particularly SMBv1, and consider SMB signing to prevent relay attacks. Apply the principle of least privilege to service accounts and audit their usage regularly. Since no patches are currently available, consider deploying web application firewalls (WAFs) to block suspicious requests targeting the vulnerable endpoint. Educate IT and security teams about this vulnerability to recognize potential exploitation attempts. Finally, maintain up-to-date backups and incident response plans tailored to credential theft scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
cisa-cg
Date Reserved
2025-04-15T20:56:24.406Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e81d26ba0e608b4fac943e

Added to database: 10/9/2025, 8:37:58 PM

Last enriched: 10/17/2025, 5:18:44 AM

Last updated: 12/4/2025, 7:35:34 PM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats