Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-35061: CWE-294 Authentication Bypass by Capture-replay in Newforma Project Center

0
High
VulnerabilityCVE-2025-35061cvecve-2025-35061cwe-294
Published: Thu Oct 09 2025 (10/09/2025, 20:22:37 UTC)
Source: CVE Database V5
Vendor/Project: Newforma
Product: Project Center

Description

CVE-2025-35061 is a high-severity authentication bypass vulnerability in Newforma Project Center's Info Exchange (NIX) component. It allows a remote, unauthenticated attacker to trigger the system to initiate an SMB connection to an attacker-controlled server, capturing the NTLMv2 hash of the NIX service account. This vulnerability stems from improper authentication validation (CWE-294) in the LegacyIntegrationServices. asmx endpoint. Exploitation does not require user interaction or prior authentication, making it highly accessible. Although no known exploits are currently in the wild, the captured NTLMv2 hashes could be subjected to offline cracking or relay attacks, potentially leading to further compromise. European organizations using Newforma Project Center, especially in architecture, engineering, and construction sectors, face risks of credential theft and lateral movement. Mitigation requires network segmentation, SMB traffic monitoring, and strict access controls on the vulnerable service. Countries with significant adoption of Newforma products and critical infrastructure projects, such as Germany, UK, France, and the Netherlands, are likely most affected. Given the ease of exploitation and high impact on confidentiality, this vulnerability is rated high severity.

AI-Powered Analysis

AILast updated: 10/17/2025, 05:20:08 UTC

Technical Analysis

CVE-2025-35061 is an authentication bypass vulnerability identified in Newforma Project Center's Info Exchange (NIX) component, specifically within the LegacyIntegrationServices.asmx web service endpoint. The flaw allows a remote attacker with no authentication or user interaction to coerce the NIX server into initiating an SMB connection to an attacker-controlled system. During this connection, the NIX service account's NTLMv2 hash is transmitted, which the attacker can capture. This vulnerability is categorized under CWE-294, indicating improper authentication mechanisms. The attack leverages the SMB protocol's challenge-response authentication to extract credential hashes without needing valid credentials or prior access. The CVSS 4.0 base score is 8.2 (high), reflecting the network attack vector, low attack complexity, no privileges required, no user interaction, and a high impact on confidentiality. Although no public exploits have been reported, the captured NTLMv2 hashes can be used in offline brute-force attacks or relay attacks to escalate privileges or move laterally within a network. The affected product, Newforma Project Center, is widely used in project information management in architecture, engineering, and construction industries, sectors that often handle sensitive project data and intellectual property. The vulnerability's exploitation could lead to unauthorized access to project data, disruption of project workflows, and potential exposure of sensitive client or design information. The lack of available patches at the time of publication necessitates immediate compensating controls to mitigate risk.

Potential Impact

For European organizations, particularly those in architecture, engineering, construction, and related project management sectors, this vulnerability poses a significant risk. The compromise of the NIX service account credentials could allow attackers to gain unauthorized access to project data repositories, manipulate or exfiltrate sensitive information, and disrupt critical project workflows. Given the collaborative nature of these industries and the reliance on shared project data, such breaches could have cascading effects on multiple stakeholders across countries. Additionally, the captured NTLMv2 hashes could facilitate lateral movement within corporate networks, potentially leading to broader compromises beyond the initial target. This risk is heightened in environments where SMB traffic is not adequately monitored or segmented, or where legacy authentication protocols remain in use. The potential exposure of intellectual property and client data could also have legal and reputational consequences under European data protection regulations such as GDPR.

Mitigation Recommendations

1. Immediately implement network segmentation to isolate the Newforma Project Center servers from untrusted networks and restrict SMB traffic to only trusted hosts. 2. Monitor SMB traffic for unusual outbound connections, especially those targeting external or unknown IP addresses, using network intrusion detection systems (NIDS) or security information and event management (SIEM) tools. 3. Enforce strict access controls and firewall rules to limit inbound access to the LegacyIntegrationServices.asmx endpoint to only authorized internal systems. 4. Disable or restrict legacy authentication protocols such as NTLM where possible, and enforce the use of more secure authentication mechanisms like Kerberos. 5. Regularly audit and rotate service account credentials associated with Newforma Project Center to reduce the window of opportunity for attackers. 6. Engage with Newforma for updates or patches addressing this vulnerability and plan for timely deployment once available. 7. Conduct internal penetration testing and vulnerability assessments focusing on SMB and authentication-related attack vectors. 8. Educate IT and security teams about this specific threat to ensure rapid detection and response to suspicious activities related to SMB connections from NIX servers.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
cisa-cg
Date Reserved
2025-04-15T20:56:24.406Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e81d27ba0e608b4fac9458

Added to database: 10/9/2025, 8:37:59 PM

Last enriched: 10/17/2025, 5:20:08 AM

Last updated: 11/24/2025, 11:45:25 PM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats