CVE-2025-35057: CWE-294 Authentication Bypass by Capture-replay in Newforma Project Center
Newforma Info Exchange (NIX) '/RemoteWeb/IntegrationServices.ashx' allows a remote, unauthenticated attacker to cause NIX to make an SMB connection to an attacker-controlled system. The attacker can capture the NTLMv2 hash of the NIX service account.
AI Analysis
Technical Summary
CVE-2025-35057 is a medium-severity authentication bypass vulnerability affecting Newforma Project Center's Info Exchange (NIX) component, specifically the '/RemoteWeb/IntegrationServices.ashx' endpoint. The flaw allows a remote attacker with no authentication to coerce the vulnerable system into making an SMB connection to an attacker-controlled server. During this forced connection, the system transmits the NTLMv2 hash of the NIX service account. This hash can be captured by the attacker and potentially used in replay attacks or pass-the-hash techniques to impersonate the service account, leading to unauthorized access or lateral movement within the victim's network. The vulnerability is categorized under CWE-294, indicating a failure in proper authentication mechanisms. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), partial attack prerequisites (AT:P) requiring low privileges (PR:L), no user interaction (UI:N), and high impact on confidentiality (VC:H) with no impact on integrity or availability. No patches or known exploits are currently available, but the vulnerability poses a significant risk due to the sensitive nature of the credentials exposed and the potential for further exploitation. The affected product is used primarily in project management within architecture, engineering, and construction industries, which often handle sensitive project data and intellectual property.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential compromise of service account credentials via NTLMv2 hash capture. This can lead to unauthorized access to project management systems, exposure of sensitive project data, and lateral movement within corporate networks. Given the use of Newforma Project Center in sectors like architecture, engineering, and construction, the confidentiality of intellectual property and client data is at risk. Additionally, attackers leveraging captured hashes could escalate privileges or access other network resources, increasing the scope of compromise. The vulnerability could disrupt business operations if attackers use the foothold to deploy ransomware or conduct espionage. Since the vulnerability requires low privileges but no user interaction, it is easier to exploit remotely, increasing the risk for organizations with exposed or poorly segmented networks. The lack of a patch means organizations must rely on compensating controls, increasing operational overhead and risk exposure until remediation is available.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Immediately restrict outbound SMB traffic from servers running Newforma Project Center to only trusted internal systems, blocking connections to untrusted or external IP addresses. 2) Monitor network traffic for unusual SMB connection attempts, especially those directed to unknown or external hosts, using network intrusion detection systems or SIEM tools. 3) Enforce strict network segmentation to isolate project management servers from other critical infrastructure and limit lateral movement opportunities. 4) Harden service accounts by applying the principle of least privilege and regularly rotating credentials to reduce the impact of captured hashes. 5) Disable or limit NTLM authentication where possible, migrating to more secure authentication protocols like Kerberos. 6) Conduct regular vulnerability scans and penetration tests focusing on SMB and authentication-related weaknesses. 7) Prepare incident response plans specifically addressing credential capture and replay attacks. 8) Engage with Newforma for updates and patches and prioritize patch deployment once available. 9) Educate IT and security teams about this specific threat to ensure rapid detection and response.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden, Belgium, Austria, Switzerland
CVE-2025-35057: CWE-294 Authentication Bypass by Capture-replay in Newforma Project Center
Description
Newforma Info Exchange (NIX) '/RemoteWeb/IntegrationServices.ashx' allows a remote, unauthenticated attacker to cause NIX to make an SMB connection to an attacker-controlled system. The attacker can capture the NTLMv2 hash of the NIX service account.
AI-Powered Analysis
Technical Analysis
CVE-2025-35057 is a medium-severity authentication bypass vulnerability affecting Newforma Project Center's Info Exchange (NIX) component, specifically the '/RemoteWeb/IntegrationServices.ashx' endpoint. The flaw allows a remote attacker with no authentication to coerce the vulnerable system into making an SMB connection to an attacker-controlled server. During this forced connection, the system transmits the NTLMv2 hash of the NIX service account. This hash can be captured by the attacker and potentially used in replay attacks or pass-the-hash techniques to impersonate the service account, leading to unauthorized access or lateral movement within the victim's network. The vulnerability is categorized under CWE-294, indicating a failure in proper authentication mechanisms. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), partial attack prerequisites (AT:P) requiring low privileges (PR:L), no user interaction (UI:N), and high impact on confidentiality (VC:H) with no impact on integrity or availability. No patches or known exploits are currently available, but the vulnerability poses a significant risk due to the sensitive nature of the credentials exposed and the potential for further exploitation. The affected product is used primarily in project management within architecture, engineering, and construction industries, which often handle sensitive project data and intellectual property.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential compromise of service account credentials via NTLMv2 hash capture. This can lead to unauthorized access to project management systems, exposure of sensitive project data, and lateral movement within corporate networks. Given the use of Newforma Project Center in sectors like architecture, engineering, and construction, the confidentiality of intellectual property and client data is at risk. Additionally, attackers leveraging captured hashes could escalate privileges or access other network resources, increasing the scope of compromise. The vulnerability could disrupt business operations if attackers use the foothold to deploy ransomware or conduct espionage. Since the vulnerability requires low privileges but no user interaction, it is easier to exploit remotely, increasing the risk for organizations with exposed or poorly segmented networks. The lack of a patch means organizations must rely on compensating controls, increasing operational overhead and risk exposure until remediation is available.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Immediately restrict outbound SMB traffic from servers running Newforma Project Center to only trusted internal systems, blocking connections to untrusted or external IP addresses. 2) Monitor network traffic for unusual SMB connection attempts, especially those directed to unknown or external hosts, using network intrusion detection systems or SIEM tools. 3) Enforce strict network segmentation to isolate project management servers from other critical infrastructure and limit lateral movement opportunities. 4) Harden service accounts by applying the principle of least privilege and regularly rotating credentials to reduce the impact of captured hashes. 5) Disable or limit NTLM authentication where possible, migrating to more secure authentication protocols like Kerberos. 6) Conduct regular vulnerability scans and penetration tests focusing on SMB and authentication-related weaknesses. 7) Prepare incident response plans specifically addressing credential capture and replay attacks. 8) Engage with Newforma for updates and patches and prioritize patch deployment once available. 9) Educate IT and security teams about this specific threat to ensure rapid detection and response.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- cisa-cg
- Date Reserved
- 2025-04-15T20:56:24.406Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68e81d26ba0e608b4fac943e
Added to database: 10/9/2025, 8:37:58 PM
Last enriched: 10/9/2025, 8:54:43 PM
Last updated: 10/11/2025, 10:45:26 AM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11596: SQL Injection in code-projects E-Commerce Website
MediumCVE-2025-58301: CWE-121 Stack-based Buffer Overflow in Huawei HarmonyOS
MediumCVE-2025-58293: CWE-264 Permissions, Privileges, and Access Controls in Huawei HarmonyOS
MediumCVE-2025-58289: CWE-840 Business Logic Errors in Huawei HarmonyOS
MediumCVE-2025-9975: CWE-918 Server-Side Request Forgery (SSRF) in rico-macchi WP Scraper
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.