Cyber Posture

CVE-2025-35062

Medium

Published: 09 October 2025

Published
09 October 2025
Modified
22 October 2025
KEV Added
Patch
CVSS Score 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
EPSS Score 0.0015 35.1th percentile
Risk Priority 11 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-35062 is a medium-severity Incorrect Default Permissions (CWE-276) vulnerability in Newforma Project Center. Its CVSS base score is 5.3 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 35.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

AC-14 explicitly defines and restricts actions permitted without identification or authentication, directly preventing the default anonymous authentication exploited in CVE-2025-35062.

prevent

SI-2 mandates timely flaw remediation, including upgrading Newforma Info Exchange to version 2023.1 or later to eliminate the anonymous authentication vulnerability.

prevent

CM-6 requires establishing secure configuration settings that disable default anonymous authentication in NIX systems.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Anonymous authentication enabled by default in public-facing Newforma Info Exchange allows unauthenticated network attackers to bypass controls and gain unauthorized access, directly enabling T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Newforma Info Exchange (NIX) before version 2023.1 by default allows anonymous authentication which allows an unauthenticated attacker to exploit additional vulnerabilities that require authentication.

Deeper analysisAI

CVE-2025-35062 affects Newforma Info Exchange (NIX) versions before 2023.1, where anonymous authentication is enabled by default. This misconfiguration, mapped to CWE-276 (Incorrect Default Permissions), allows unauthenticated attackers to bypass authentication controls and access additional vulnerabilities that require login credentials. The issue carries a CVSS v3.1 base score of 5.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N), indicating medium severity with low confidentiality impact over the network.

Unauthenticated attackers with network access can exploit this vulnerability due to its low attack complexity and lack of required privileges or user interaction. By leveraging anonymous authentication, they can chain it with other authentication-dependent flaws in NIX, achieving unauthorized access that results in limited disclosure of sensitive information, as reflected in the CVSS metrics.

Advisories provide further guidance on mitigation, including the CISA CSAF document at https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-282-01.json and the official CVE record at https://www.cve.org/CVERecord?id=CVE-2025-35062. Upgrading to NIX version 2023.1 or later addresses the default anonymous authentication setting.

Details

CWE(s)

Affected Products

newforma
project center
≤ 2023.1

CVEs Like This One

CVE-2025-35050Same product: Newforma Project Center
CVE-2025-35051Same product: Newforma Project Center
CVE-2025-35055Same product: Newforma Project Center
CVE-2024-57684Shared CWE-276
CVE-2024-55225Shared CWE-276
CVE-2024-55959Shared CWE-276
CVE-2025-25535Shared CWE-276
CVE-2024-55215Shared CWE-276
CVE-2025-24399Shared CWE-276
CVE-2025-27677Shared CWE-276

References