CVE-2025-35051
BaseFortify
Publication date: 2025-10-09
Last updated on: 2026-04-26
Assigner: Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| newforma | info_exchange | * |
| newforma | project_center | 2024.3 |
| newforma | project_center | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-306 | The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources. |
| CWE-502 | The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in Newforma Project Center Server (NPCS), which accepts serialized .NET data via the '/ProjectCenter.rem' endpoint on TCP port 9003. A remote, unauthenticated attacker can exploit this to execute arbitrary code on the server with 'NT AUTHORITY\NetworkService' privileges. The vulnerable endpoint is intended to be accessible only within an internal network. The recommended mitigation is to restrict network access to NPCS to prevent exploitation.
How can this vulnerability impact me? :
Exploitation of this vulnerability allows a remote attacker to execute arbitrary code on the Newforma Project Center Server with elevated privileges ('NT AUTHORITY\NetworkService'). This can lead to unauthorized control over the server, potentially compromising sensitive project data, disrupting services, or enabling further attacks within the internal network.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
You can detect this vulnerability by checking for access or attempts to access the '/ProjectCenter.rem' endpoint on TCP port 9003 within your internal network. Network monitoring tools or commands like 'netstat -an | find "9003"' on the server can help identify if the port is open and listening. Additionally, using tools like 'curl' or 'Invoke-WebRequest' to test connectivity to http://<NPCS-server>:9003/ProjectCenter.rem may confirm if the vulnerable endpoint is accessible. Monitoring logs for unusual or unauthorized requests to this endpoint can also help detect exploitation attempts.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to restrict network access to the Newforma Project Center Server (NPCS) endpoint on port 9003, specifically the '/ProjectCenter.rem' endpoint. According to the recommended architecture, this endpoint should only be accessible on an internal network. Implement firewall rules or network segmentation to block external or unauthorized internal access to this port and endpoint to prevent remote exploitation.