CVE-2023-26388

7.8 HIGH

📋 TL;DR

Adobe Substance 3D Stager versions 2.0.1 and earlier contain an improper input validation vulnerability that allows arbitrary code execution when a user opens a malicious file. This affects users of Adobe Substance 3D Stager who open untrusted project files. The attacker needs to trick a user into opening a specially crafted file.

💻 Affected Systems

Products:
  • Adobe Substance 3D Stager
Versions: 2.0.1 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. Requires user interaction to open malicious file.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the victim's computer in the context of the current user, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Local privilege escalation leading to malware installation, data exfiltration, or persistence mechanisms being established on the victim's workstation.

🟢

If Mitigated

Limited impact with proper application sandboxing, user privilege restrictions, and file validation controls in place.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file). No public exploit code has been disclosed as of knowledge cutoff.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.0.2 or later

Vendor Advisory: https://helpx.adobe.com/security/products/substance3d_stager/apsb23-26.html

Restart Required: Yes

Instructions:

1. Open Adobe Substance 3D Stager. 2. Go to Help > Check for Updates. 3. Follow prompts to install version 2.0.2 or later. 4. Restart the application.

🔧 Temporary Workarounds

Restrict file opening

all

Only open Substance 3D Stager files from trusted sources. Implement file validation policies.

Run with reduced privileges

windows

Run Adobe Substance 3D Stager with standard user privileges instead of administrative rights.

🧯 If You Can't Patch

  • Discontinue use of Adobe Substance 3D Stager until patched.
  • Implement application control to block execution of vulnerable versions.

🔍 How to Verify

Check if Vulnerable:

Check Adobe Substance 3D Stager version in Help > About. If version is 2.0.1 or earlier, system is vulnerable.

Check Version:

On Windows: Check application version in Control Panel > Programs > Programs and Features. On macOS: Check application version in Applications folder.

Verify Fix Applied:

Verify version is 2.0.2 or later in Help > About.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process creation from Substance 3D Stager
  • File access to suspicious .sbs or project files
  • Application crash logs

Network Indicators:

  • Outbound connections from Substance 3D Stager to unexpected destinations
  • DNS queries for suspicious domains

SIEM Query:

process_name:"Substance 3D Stager.exe" AND (parent_process:explorer.exe OR cmdline:*sbs*)

🔗 References

📤 Share & Export