CVE-2024-47429

7.8 HIGH

📋 TL;DR

CVE-2024-47429 is an out-of-bounds write vulnerability in Adobe Substance3D Painter that could allow arbitrary code execution when a user opens a malicious file. This affects users of Substance3D Painter versions 10.1.0 and earlier, requiring user interaction to trigger exploitation.

💻 Affected Systems

Products:
  • Adobe Substance3D Painter
Versions: 10.1.0 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. Requires user to open a malicious Substance3D Painter project file.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the current user, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation leading to malware installation, credential theft, or persistence mechanisms being established on the affected workstation.

🟢

If Mitigated

Limited impact due to application sandboxing or restricted user privileges, potentially resulting in application crash rather than full code execution.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file). No public exploit code has been disclosed as of the advisory date.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.2.0 or later

Vendor Advisory: https://helpx.adobe.com/security/products/substance3d_painter/apsb24-86.html

Restart Required: Yes

Instructions:

1. Open Adobe Substance3D Painter. 2. Navigate to Help > Check for Updates. 3. Follow prompts to install version 10.2.0 or later. 4. Restart the application after installation completes.

🔧 Temporary Workarounds

Restrict file opening

all

Configure application or system policies to prevent opening untrusted Substance3D Painter project files

Run with reduced privileges

windows

Run Substance3D Painter with limited user privileges to reduce impact of successful exploitation

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized binaries
  • Use network segmentation to isolate systems running vulnerable versions

🔍 How to Verify

Check if Vulnerable:

Check Substance3D Painter version via Help > About Substance Painter. If version is 10.1.0 or earlier, the system is vulnerable.

Check Version:

Not applicable - check via application GUI

Verify Fix Applied:

Verify version is 10.2.0 or later in Help > About Substance Painter after applying update.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with memory access violations
  • Unexpected process creation from Substance3D Painter

Network Indicators:

  • Outbound connections from Substance3D Painter to unexpected destinations

SIEM Query:

process_name:"Substance Painter.exe" AND (event_type:crash OR parent_process:unexpected)

🔗 References

📤 Share & Export