CVE-2025-35054
BaseFortify
Publication date: 2025-10-09
Last updated on: 2025-10-22
Assigner: Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| newforma | project_center | to 2024.3 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-257 | The storage of passwords in a recoverable format makes them subject to password reuse attacks by malicious users. In fact, it should be noted that recoverable encrypted passwords provide no significant benefit over plaintext passwords since they are subject not only to reuse by malicious attackers but also by malicious insiders. If a system administrator can recover a password directly, or use a brute force search on the available information, the administrator can use the password on other accounts. |
| CWE-922 | The product stores sensitive information without properly limiting read or write access by unauthorized actors. |
| CWE-522 | The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves Newforma Info Exchange (NIX) storing credentials used to configure NPCS in the Windows registry under 'HKLM\Software\WOW6432Node\Newforma\<version>\Credentials'. Although the credentials are encrypted, the encryption key is stored in the same registry location. Authenticated users with access to this registry path can retrieve both the encrypted credentials and the key, potentially allowing them to decrypt the credentials. If these credentials are Active Directory credentials, an attacker could use them to access additional systems and resources.
How can this vulnerability impact me? :
The vulnerability can allow an authenticated user to obtain sensitive credentials by accessing the registry location where both the encrypted credentials and their encryption key are stored. This can lead to unauthorized access to Active Directory credentials, enabling an attacker to move laterally within a network and gain access to additional systems and resources, potentially compromising the security of the environment.