CVE-2024-20723

7.8 HIGH

📋 TL;DR

A buffer overflow vulnerability in Substance3D Painter versions 9.1.1 and earlier allows attackers to execute arbitrary code by tricking users into opening malicious files. This affects users of Adobe's Substance3D Painter software who open untrusted project files.

💻 Affected Systems

Products:
  • Adobe Substance3D Painter
Versions: 9.1.1 and earlier
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable when opening files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the current user, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Local privilege escalation leading to malware installation, data exfiltration, or persistence mechanisms on the affected workstation.

🟢

If Mitigated

Limited impact if user runs with minimal privileges, has application sandboxing, and avoids opening untrusted files.

🌐 Internet-Facing: LOW - Exploitation requires user interaction to open malicious files, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Internal users could be targeted via phishing or shared malicious files, but requires user interaction.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file) and buffer overflow exploitation knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.1.2 or later

Vendor Advisory: https://helpx.adobe.com/security/products/substance3d_painter/apsb24-04.html

Restart Required: Yes

Instructions:

1. Open Substance3D Painter. 2. Go to Help > Check for Updates. 3. Install version 9.1.2 or later. 4. Restart the application.

🔧 Temporary Workarounds

Restrict file opening

all

Only open Substance3D Painter files from trusted sources and avoid opening files from unknown or untrusted sources.

Run with reduced privileges

all

Run Substance3D Painter with limited user privileges to reduce impact if exploited.

🧯 If You Can't Patch

  • Isolate affected systems from critical networks and data
  • Implement application whitelisting to prevent execution of unauthorized code

🔍 How to Verify

Check if Vulnerable:

Check Substance3D Painter version in Help > About. If version is 9.1.1 or earlier, system is vulnerable.

Check Version:

Not applicable - check via application GUI Help > About

Verify Fix Applied:

Verify version is 9.1.2 or later in Help > About after update.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with memory access violations
  • Unexpected process creation from Substance3D Painter

Network Indicators:

  • Unusual outbound connections from Substance3D Painter process

SIEM Query:

Process creation where parent process is 'Substance3D Painter' AND command line contains suspicious patterns

🔗 References

📤 Share & Export