CVE-2025-35051
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-09

Last updated on: 2026-04-26

Assigner: Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government

Description
Newforma Project Center Server (NPCS) accepts serialized .NET data via the '/ProjectCenter.rem' endpoint on 9003/tcp, allowing a remote, unauthenticated attacker to execute arbitrary code with 'NT AUTHORITY\NetworkService' privileges. According to the recommended architecture, the vulnerable NPCS endpoint is only accessible on an internal network. To mitigate this vulnerability, restrict network access to NPCS.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-09
Last Modified
2026-04-26
Generated
2026-05-06
AI Q&A
2025-10-09
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
newforma info_exchange *
newforma project_center 2024.3
newforma project_center *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-306 The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
CWE-502 The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in Newforma Project Center Server (NPCS), which accepts serialized .NET data via the '/ProjectCenter.rem' endpoint on TCP port 9003. A remote, unauthenticated attacker can exploit this to execute arbitrary code on the server with 'NT AUTHORITY\NetworkService' privileges. The vulnerable endpoint is intended to be accessible only within an internal network. The recommended mitigation is to restrict network access to NPCS to prevent exploitation.


How can this vulnerability impact me? :

Exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the Newforma Project Center Server with elevated privileges ('NT AUTHORITY\NetworkService'). This can lead to unauthorized control over the server, potentially compromising sensitive project data, disrupting services, or enabling further attacks within the internal network.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

You can detect this vulnerability by checking for access or attempts to access the '/ProjectCenter.rem' endpoint on TCP port 9003 within your internal network. Network monitoring tools or commands like 'netstat -an | find "9003"' on the server can help identify if the port is open and listening. Additionally, using tools like 'curl' or 'Invoke-WebRequest' to test connectivity to http://<NPCS-server>:9003/ProjectCenter.rem may confirm if the vulnerable endpoint is accessible. Monitoring logs for unusual or unauthorized requests to this endpoint can also help detect exploitation attempts.


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to restrict network access to the Newforma Project Center Server (NPCS) endpoint on port 9003, specifically the '/ProjectCenter.rem' endpoint. According to the recommended architecture, this endpoint should only be accessible on an internal network. Implement firewall rules or network segmentation to block external or unauthorized internal access to this port and endpoint to prevent remote exploitation.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart