CVE-2025-35052

5.3 MEDIUM

📋 TL;DR

Newforma Info Exchange (NIX) uses a hard-coded encryption key for query parameters, allowing attackers to bypass authentication and authorization by manipulating encrypted parameters like 'qs' to download files. This affects NIX installations using vulnerable versions, particularly those with internet-facing download endpoints.

💻 Affected Systems

Products:
  • Newforma Info Exchange (NIX)
Versions: Versions before 2023.3 and 2024.1
Operating Systems: Windows Server (primary deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: NIX 2023.3 and 2024.1 limit but may not completely eliminate hard-coded key usage. All default installations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthenticated attackers could download sensitive files from the system, potentially exposing confidential project data, credentials, or system files.

🟠

Likely Case

Attackers with some system knowledge could access files they shouldn't have permission to view, leading to data leakage of project documents or configuration files.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to files accessible through the vulnerable endpoint only.

🌐 Internet-Facing: HIGH - The '/DownloadWeb/download.aspx' endpoint is typically internet-facing, allowing direct exploitation from external networks.
🏢 Internal Only: MEDIUM - Internal attackers could still exploit this to bypass authorization controls and access unauthorized files.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires understanding of the encryption scheme and parameter manipulation, but no authentication is needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: NIX 2023.3 or 2024.1

Vendor Advisory: https://www.cve.org/CVERecord?id=CVE-2025-35052

Restart Required: No

Instructions:

1. Upgrade to NIX 2023.3 or 2024.1. 2. Apply vendor-provided patches if available. 3. Verify the fix by testing parameter encryption behavior.

🔧 Temporary Workarounds

Restrict Download Endpoint Access

all

Implement network-level restrictions to limit access to the vulnerable '/DownloadWeb/download.aspx' endpoint.

# Example firewall rule (Windows): New-NetFirewallRule -DisplayName 'Block NIX Download' -Direction Inbound -Protocol TCP -LocalPort 80,443 -RemoteAddress 0.0.0.0/0 -Action Block -Program 'C:\Program Files\Newforma\NIX\...'

Implement WAF Rules

all

Configure web application firewall to block or sanitize the 'qs' parameter in download requests.

# Example ModSecurity rule: SecRule ARGS:qs "@rx encrypted_pattern" "id:1001,phase:2,deny,msg:'Block NIX CVE-2025-35052 exploit'"

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate NIX servers from untrusted networks.
  • Deploy application-level monitoring to detect unusual download patterns or parameter manipulation attempts.

🔍 How to Verify

Check if Vulnerable:

Test if manipulating the 'qs' parameter in '/DownloadWeb/download.aspx' requests allows unauthorized file downloads without proper authentication.

Check Version:

Check NIX version in application interface or configuration files, typically in 'C:\Program Files\Newforma\NIX\version.txt' or similar location.

Verify Fix Applied:

After patching, verify that encrypted parameters no longer work with the hard-coded key and that proper authentication is enforced for file downloads.

📡 Detection & Monitoring

Log Indicators:

  • Unusual download patterns from '/DownloadWeb/download.aspx'
  • Requests with manipulated 'qs' parameter values
  • Failed authentication attempts followed by successful downloads

Network Indicators:

  • Unusual traffic patterns to download endpoints
  • Requests with encrypted parameters from unexpected sources

SIEM Query:

source="nix_logs" AND (url="/DownloadWeb/download.aspx" AND (qs=* OR parameter_tampering=*))

🔗 References

📤 Share & Export