CVE-2024-45141

7.8 HIGH

📋 TL;DR

CVE-2024-45141 is an out-of-bounds write vulnerability in Substance3D Stager that could allow arbitrary code execution when a user opens a malicious file. This affects users of Substance3D Stager versions 3.0.3 and earlier, requiring user interaction to trigger the exploit.

💻 Affected Systems

Products:
  • Adobe Substance3D Stager
Versions: 3.0.3 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable by default when processing malicious files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the user's system and potentially pivoting to other systems on the network.

🟠

Likely Case

Local privilege escalation leading to data theft, ransomware deployment, or persistence establishment on the affected system.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions, potentially resulting in application crash only.

🌐 Internet-Facing: LOW - Exploitation requires user interaction with malicious files, not directly network exploitable.
🏢 Internal Only: MEDIUM - Internal users could be targeted via phishing or shared malicious files, but requires user interaction.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file) and knowledge of file format manipulation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.0.4 or later

Vendor Advisory: https://helpx.adobe.com/security/products/substance3d_stager/apsb24-81.html

Restart Required: Yes

Instructions:

1. Open Substance3D Stager. 2. Go to Help > Check for Updates. 3. Install available updates. 4. Restart the application.

🔧 Temporary Workarounds

Restrict file processing

all

Configure application to only open trusted files from verified sources

Run with reduced privileges

all

Run Substance3D Stager with limited user privileges to reduce impact

🧯 If You Can't Patch

  • Restrict user permissions to limit damage from successful exploitation
  • Implement application allowlisting to prevent unauthorized execution

🔍 How to Verify

Check if Vulnerable:

Check Substance3D Stager version in application settings or About dialog

Check Version:

Open Substance3D Stager and navigate to Help > About Substance3D Stager

Verify Fix Applied:

Verify version is 3.0.4 or later after update installation

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with memory access violations
  • Unexpected file processing from untrusted sources

Network Indicators:

  • Unusual outbound connections after file processing

SIEM Query:

EventID=1000 OR EventID=1001 AND ProcessName="Stager.exe" AND ExceptionCode="0xc0000005"

🔗 References

📤 Share & Export