CVE-2025-35062
Published: 09 October 2025
Summary
CVE-2025-35062 is a medium-severity Incorrect Default Permissions (CWE-276) vulnerability in Newforma Project Center. Its CVSS base score is 5.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 35.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
AC-14 explicitly defines and restricts actions permitted without identification or authentication, directly preventing the default anonymous authentication exploited in CVE-2025-35062.
SI-2 mandates timely flaw remediation, including upgrading Newforma Info Exchange to version 2023.1 or later to eliminate the anonymous authentication vulnerability.
CM-6 requires establishing secure configuration settings that disable default anonymous authentication in NIX systems.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Anonymous authentication enabled by default in public-facing Newforma Info Exchange allows unauthenticated network attackers to bypass controls and gain unauthorized access, directly enabling T1190: Exploit Public-Facing Application.
NVD Description
Newforma Info Exchange (NIX) before version 2023.1 by default allows anonymous authentication which allows an unauthenticated attacker to exploit additional vulnerabilities that require authentication.
Deeper analysisAI
CVE-2025-35062 affects Newforma Info Exchange (NIX) versions before 2023.1, where anonymous authentication is enabled by default. This misconfiguration, mapped to CWE-276 (Incorrect Default Permissions), allows unauthenticated attackers to bypass authentication controls and access additional vulnerabilities that require login credentials. The issue carries a CVSS v3.1 base score of 5.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N), indicating medium severity with low confidentiality impact over the network.
Unauthenticated attackers with network access can exploit this vulnerability due to its low attack complexity and lack of required privileges or user interaction. By leveraging anonymous authentication, they can chain it with other authentication-dependent flaws in NIX, achieving unauthorized access that results in limited disclosure of sensitive information, as reflected in the CVSS metrics.
Advisories provide further guidance on mitigation, including the CISA CSAF document at https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-282-01.json and the official CVE record at https://www.cve.org/CVERecord?id=CVE-2025-35062. Upgrading to NIX version 2023.1 or later addresses the default anonymous authentication setting.
Details
- CWE(s)