Newforma Info Exchange (NIX) '/UserWeb/Common/MarkupServices.ashx' 'StreamStampImage' accepts an encrypted file path and returns an image of the specified file. An authenticated attacker can read arbitrary files subject to the privileges of NIX, typically 'NT AUTHORITY\NetworkService', and the ability of StreamStampImage to process the file. The encrypted file path can be generated using the shared, hard-coded secret key described in CVE-2025-35052. This vulnerability cannot be exploited as an 'anonymous' user as described in CVE-2025-35062.
Metrics
Affected Vendors & Products
References
History
Wed, 22 Oct 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Newforma project Center
|
|
| CPEs | cpe:2.3:a:newforma:project_center:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Newforma project Center
|
Wed, 15 Oct 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 10 Oct 2025 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Newforma
Newforma project Center Server |
|
| Vendors & Products |
Newforma
Newforma project Center Server |
Thu, 09 Oct 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Newforma Info Exchange (NIX) '/UserWeb/Common/MarkupServices.ashx' 'StreamStampImage' accepts an encrypted file path and returns an image of the specified file. An authenticated attacker can read arbitrary files subject to the privileges of NIX, typically 'NT AUTHORITY\NetworkService', and the ability of StreamStampImage to process the file. The encrypted file path can be generated using the shared, hard-coded secret key described in CVE-2025-35052. This vulnerability cannot be exploited as an 'anonymous' user as described in CVE-2025-35062. | |
| Title | Newforma Info Exchange (NIX) limited file read | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: cisa-cg
Published: 2025-10-09T20:21:10.405Z
Updated: 2025-10-15T16:15:37.325Z
Reserved: 2025-04-15T20:56:24.406Z
Link: CVE-2025-35056
Updated: 2025-10-10T19:33:37.332Z
Status : Analyzed
Published: 2025-10-09T21:15:36.670
Modified: 2025-10-22T15:16:36.560
Link: CVE-2025-35056
No data.