CVE-2025-35061

5.9 MEDIUM

📋 TL;DR

CVE-2025-35061 is an authentication relay vulnerability in Newforma Info Exchange (NIX) that allows unauthenticated attackers to force the system to make SMB connections to attacker-controlled servers. This enables capture of NTLMv2 hashes from the NIX service account, potentially leading to credential theft. Organizations running vulnerable NIX instances with internet-facing LegacyIntegrationServices.asmx endpoints are affected.

💻 Affected Systems

Products:
  • Newforma Info Exchange (NIX)
Versions: Specific versions not detailed in CVE; all versions with vulnerable endpoint likely affected
Operating Systems: Windows (due to SMB/NTLMv2 involvement)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the '/NPCSRemoteWeb/LegacyIntegrationServices.asmx' endpoint to be accessible. NIX service account must be configured with domain credentials for hash capture to be valuable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers capture service account NTLMv2 hash, crack it offline, gain authenticated access to NIX system, pivot to internal network resources, and potentially achieve domain compromise.

🟠

Likely Case

Attackers capture NTLMv2 hash, attempt offline cracking, and if successful, gain access to NIX system with service account privileges.

🟢

If Mitigated

With proper network segmentation and monitoring, attackers can only capture hashes but cannot successfully crack them or use them to access protected systems.

🌐 Internet-Facing: HIGH - Unauthenticated exploitation allows remote attackers to trigger SMB connections and capture credentials without any authentication.
🏢 Internal Only: MEDIUM - Internal attackers can still exploit this, but requires network access and may be detected by internal monitoring.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires setting up an SMB server to capture NTLMv2 responses. No authentication needed to trigger the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Newforma vendor advisory for specific patched versions

Vendor Advisory: https://www.newforma.com/security-advisories/

Restart Required: No

Instructions:

1. Check Newforma security advisory for CVE-2025-35061. 2. Apply the recommended patch/update from Newforma. 3. Verify the LegacyIntegrationServices.asmx endpoint no longer makes unauthorized SMB connections.

🔧 Temporary Workarounds

Block external SMB connections

windows

Prevent NIX system from making outbound SMB connections to untrusted networks

Windows Firewall: New-NetFirewallRule -DisplayName 'Block NIX SMB Outbound' -Direction Outbound -Protocol TCP -RemotePort 445 -Action Block
Group Policy: Configure outbound firewall rules to block TCP 445 to external networks

Restrict endpoint access

windows

Limit access to the vulnerable LegacyIntegrationServices.asmx endpoint

IIS: Add IP restrictions to /NPCSRemoteWeb/LegacyIntegrationServices.asmx
Web.config: <location path='NPCSRemoteWeb/LegacyIntegrationServices.asmx'> with appropriate authorization rules

🧯 If You Can't Patch

  • Implement network segmentation to prevent NIX system from making outbound SMB connections to untrusted networks
  • Monitor for outbound SMB connections from NIX systems to unknown IP addresses
  • Use strong, complex passwords for NIX service account to make hash cracking difficult
  • Consider disabling the LegacyIntegrationServices.asmx endpoint if not required

🔍 How to Verify

Check if Vulnerable:

Test if unauthenticated requests to https://[nix-server]/NPCSRemoteWeb/LegacyIntegrationServices.asmx trigger outbound SMB connections. Monitor network traffic for SMB (TCP 445) connections from NIX server after accessing endpoint.

Check Version:

Check NIX version through administrative interface or consult Newforma documentation for version identification methods.

Verify Fix Applied:

After patching, verify that accessing the LegacyIntegrationServices.asmx endpoint no longer triggers outbound SMB connections. Test with network monitoring tools.

📡 Detection & Monitoring

Log Indicators:

  • IIS logs showing access to LegacyIntegrationServices.asmx from untrusted sources
  • Windows event logs showing SMB client authentication attempts from NIX service account

Network Indicators:

  • Outbound SMB (TCP 445) connections from NIX server to unknown external IPs
  • NTLM authentication traffic from NIX server to unexpected destinations

SIEM Query:

source_ip=[NIX_SERVER] AND dest_port=445 AND protocol=TCP AND dest_ip NOT IN [trusted_networks]

🔗 References

📤 Share & Export