Newforma Project Center Server (NPCS) accepts serialized .NET data via the '/ProjectCenter.rem' endpoint on 9003/tcp, allowing a remote, unauthenticated attacker to execute arbitrary code with 'NT AUTHORITY\NetworkService' privileges. According to the recommended architecture, the vulnerable NPCS endpoint is only accessible on an internal network. To mitigate this vulnerability, restrict network access to NPCS.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 09 Oct 2025 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Newforma Project Center Server (NPCS) accepts serialized .NET data via the '/ProjectCenter.rem' endpoint on 9003/tcp, allowing a remote, unauthenticated attacker to execute arbitrary code with 'NT AUTHORITY\NetworkService' privileges. According to the recommended architecture, the vulnerable NPCS endpoint is only accessible on an internal network. To mitigate this vulnerability, restrict network access to NPCS. | |
Title | Newforma Project Center Server (NPCS) .NET unauthenticated deserialization | |
Weaknesses | CWE-306 CWE-502 |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: cisa-cg
Published:
Updated: 2025-10-09T20:19:43.826Z
Reserved: 2025-04-15T20:56:24.405Z
Link: CVE-2025-35051

No data.

Status : Received
Published: 2025-10-09T21:15:35.873
Modified: 2025-10-09T21:15:35.873
Link: CVE-2025-35051

No data.

No data.