Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-35051— Newforma Project Center Server (NPCS) .NET unauthenticated deserialization

CVSS 9.8 · Critical EPSS 0.24% · P47
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-35051

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Newforma Project Center Server (NPCS) .NET unauthenticated deserialization
Source: NVD (National Vulnerability Database)
Vulnerability Description
Newforma Project Center Server (NPCS) accepts serialized .NET data via the '/ProjectCenter.rem' endpoint on 9003/tcp, allowing a remote, unauthenticated attacker to execute arbitrary code with 'NT AUTHORITY\NetworkService' privileges. According to the recommended architecture, the vulnerable NPCS endpoint is only accessible on an internal network. To mitigate this vulnerability, restrict network access to NPCS.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
可信数据的反序列化
Source: NVD (National Vulnerability Database)
Vulnerability Title
Newforma Project Center Server 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Newforma Project Center Server是Newforma公司的一个建筑、工程和施工(AEC)行业的项目信息管理解决方案,用于集中存储和管理项目文档和协作。 Newforma Project Center Server存在安全漏洞,该漏洞源于通过ProjectCenter.rem端点接受序列化.NET数据,可能导致远程未经验证的攻击者以NT AUTHORITYNetworkService权限执行任意代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
NewformaProject Center * -

II. Public POCs for CVE-2025-35051

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-35051

登录查看更多情报信息。

Same Patch Batch · Newforma · 2025-10-09 · 13 CVEs total

CVE-2025-350509.8 CRITICALNewforma Info Exchange (NIX) .NET unauthenticated deserialization
CVE-2025-350558.8 HIGHNewforma Info Exchange (NIX) insecure file upload
CVE-2025-350536.4 MEDIUMNewforma Info Exchange (NIX) arbitrary file read and delete
CVE-2025-350585.9 MEDIUMNewforma Info Exchange (NIX) forced NTLMv2 authentication via /UserWeb/Common/MarkupServic
CVE-2025-350615.9 MEDIUMNewforma Info Exchange (NIX) forced NTLMv2 authentication via /NPCSRemoteWeb/LegacyIntegra
CVE-2025-350605.5 MEDIUMNewforma Info Exchange (NIX) stored XSS via SVG file upload
CVE-2025-350545.3 MEDIUMNewforma Info Exchange (NIX) insufficiently protected credentials
CVE-2025-350625.3 MEDIUMNewforma Info Exchange (NIX) default anonymous access
CVE-2025-350575.3 MEDIUMNewforma Info Exchange (NIX) forced NTLMv2 authentication via /RemoteWeb/IntegrationServic
CVE-2025-350525.3 MEDIUMNewforma Info Exchange (NIX) shared hard-coded secret key
CVE-2025-350565.0 MEDIUMNewforma Info Exchange (NIX) limited file read
CVE-2025-350594.3 MEDIUMNewforma Info Exchange (NIX) open URL redirect via /DownloadWeb/hyperlinkredirect.aspx

IV. Related Vulnerabilities

V. Comments for CVE-2025-35051

No comments yet


Leave a comment