CVE-2025-21128

7.8 HIGH

📋 TL;DR

CVE-2025-21128 is a stack-based buffer overflow vulnerability in Substance3D Stager that allows arbitrary code execution when a user opens a malicious file. Attackers can gain full control of the affected system with the privileges of the current user. All users of Substance3D Stager versions 3.0.4 and earlier are affected.

💻 Affected Systems

Products:
  • Adobe Substance3D Stager
Versions: 3.0.4 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the logged-in user, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation leading to malware installation, data exfiltration, or persistence mechanisms being established on the compromised system.

🟢

If Mitigated

Limited impact due to user awareness training preventing malicious file opening, or application running in sandboxed/restricted environments.

🌐 Internet-Facing: LOW - Exploitation requires user interaction to open malicious files, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Internal users could be targeted via phishing or shared malicious files, but requires user interaction.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file) and knowledge of buffer overflow techniques. No public exploits known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.0.5 or later

Vendor Advisory: https://helpx.adobe.com/security/products/substance3d_stager/apsb25-03.html

Restart Required: No

Instructions:

1. Open Adobe Creative Cloud application. 2. Navigate to 'Apps' section. 3. Find Substance3D Stager and click 'Update'. 4. Alternatively, download latest version from Adobe website and install.

🔧 Temporary Workarounds

Restrict file opening

all

Implement application control policies to prevent opening untrusted files with Substance3D Stager

User awareness training

all

Train users to only open Substance3D Stager files from trusted sources

🧯 If You Can't Patch

  • Remove Substance3D Stager from systems until patched
  • Implement application whitelisting to block Substance3D Stager execution

🔍 How to Verify

Check if Vulnerable:

Check Substance3D Stager version in application 'About' menu or via Creative Cloud app

Check Version:

On Windows: Check 'Help > About Substance3D Stager'. On macOS: 'Substance3D Stager > About Substance3D Stager'

Verify Fix Applied:

Verify version is 3.0.5 or later after update

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with memory access violations
  • Unexpected process creation from Substance3D Stager

Network Indicators:

  • Outbound connections from Substance3D Stager to unknown IPs post-crash

SIEM Query:

Process creation where parent_process contains 'stager' AND (process contains 'cmd' OR process contains 'powershell' OR process contains 'bash')

🔗 References

📤 Share & Export