Newforma Info Exchange (NIX) accepts serialized .NET data via the '/remoteweb/remote.rem' endpoint, allowing a remote, unauthenticated attacker to execute arbitrary code with 'NT AUTHORITY\NetworkService' privileges. The vulnerable endpoint is used by Newforma Project Center Server (NPCS), so a compromised NIX system can be used to attack an associated NPCS system. To mitigate this vulnerability, restrict network access to the '/remoteweb/remote.rem' endpoint, for example using the IIS URL Rewrite Module.
References
| Link | Resource |
|---|---|
| https://learn.microsoft.com/en-us/iis/extensions/url-rewrite-module/using-the-url-rewrite-module | Product |
| https://projectcenter.help.newforma.com/overviews/info_exchange_overview/ | Product |
| https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-282-01.json | Third Party Advisory |
| https://www.cve.org/CVERecord?id=CVE-2025-35050 | Third Party Advisory US Government Resource |
Configurations
History
09 Jan 2026, 18:19
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Newforma project Center
Newforma |
|
| CPE | cpe:2.3:a:newforma:project_center:2024.3:*:*:*:*:*:*:* | |
| References | () https://learn.microsoft.com/en-us/iis/extensions/url-rewrite-module/using-the-url-rewrite-module - Product | |
| References | () https://projectcenter.help.newforma.com/overviews/info_exchange_overview/ - Product | |
| References | () https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-282-01.json - Third Party Advisory | |
| References | () https://www.cve.org/CVERecord?id=CVE-2025-35050 - Third Party Advisory, US Government Resource |
09 Oct 2025, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-09 21:15
Updated : 2026-01-09 18:19
NVD link : CVE-2025-35050
Mitre link : CVE-2025-35050
CVE.ORG link : CVE-2025-35050
JSON object : View
Products Affected
newforma
- project_center
