CVE-2025-27165

5.5 MEDIUM

📋 TL;DR

Substance3D Stager versions 3.1.2 and earlier contain an out-of-bounds read vulnerability that could allow attackers to read sensitive memory contents. Users who open malicious files with affected software are vulnerable to potential information disclosure. This requires user interaction through opening a malicious file.

💻 Affected Systems

Products:
  • Adobe Substance 3D Stager
Versions: 3.1.2 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable by default when processing files

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Disclosure of sensitive memory contents including credentials, encryption keys, or other application data stored in memory

🟠

Likely Case

Limited information disclosure from application memory, potentially revealing file paths, temporary data, or partial memory contents

🟢

If Mitigated

No impact if users don't open untrusted files or if software is patched

🌐 Internet-Facing: LOW - Requires user interaction and file opening, not directly exploitable over network
🏢 Internal Only: MEDIUM - Internal users could be targeted with malicious files via email or shared drives

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user to open a specially crafted malicious file; no authentication bypass needed but requires user interaction

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.1.3 or later

Vendor Advisory: https://helpx.adobe.com/security/products/substance3d_stager/apsb25-64.html

Restart Required: Yes

Instructions:

1. Open Adobe Creative Cloud desktop app
2. Navigate to Apps tab
3. Find Substance 3D Stager
4. Click Update to version 3.1.3 or later
5. Restart the application after update completes

🔧 Temporary Workarounds

Restrict file opening

all

Only open trusted files from verified sources

Application sandboxing

all

Run Substance 3D Stager in sandboxed environment to limit memory access

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of older vulnerable versions
  • Use email/web filtering to block suspicious file attachments that could exploit this vulnerability

🔍 How to Verify

Check if Vulnerable:

Check Substance 3D Stager version in Help > About menu

Check Version:

Not applicable - check via application GUI Help > About menu

Verify Fix Applied:

Verify version is 3.1.3 or later in Help > About menu

📡 Detection & Monitoring

Log Indicators:

  • Application crash logs from Substance 3D Stager
  • Unexpected memory access errors in system logs

Network Indicators:

  • File downloads followed by Substance 3D Stager process activity

SIEM Query:

process_name:"Substance 3D Stager.exe" AND (event_type:crash OR memory_violation)

🔗 References

📤 Share & Export