CVE-2025-27172

7.8 HIGH

📋 TL;DR

CVE-2025-27172 is an out-of-bounds write vulnerability in Substance3D Designer that could allow arbitrary code execution when a user opens a malicious file. This affects users of Substance3D Designer versions 14.1 and earlier. Successful exploitation requires user interaction through opening a specially crafted file.

💻 Affected Systems

Products:
  • Adobe Substance3D Designer
Versions: 14.1 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable by default. No special configuration is required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the victim's computer in the context of the current user, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation leading to malware installation, data exfiltration, or persistence mechanisms being established on the affected system.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions, potentially resulting in application crash rather than full code execution.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file). No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 14.2 or later

Vendor Advisory: https://helpx.adobe.com/security/products/substance3d_designer/apsb25-22.html

Restart Required: No

Instructions:

1. Open Substance3D Designer. 2. Go to Help > Check for Updates. 3. Follow prompts to install version 14.2 or later. 4. Verify installation by checking version in About dialog.

🔧 Temporary Workarounds

Restrict file opening

all

Implement policies to prevent users from opening untrusted Substance3D Designer files from unknown sources.

Application control

all

Use application whitelisting to restrict which users can run Substance3D Designer.

🧯 If You Can't Patch

  • Implement strict user privilege restrictions to limit potential damage from exploitation
  • Deploy endpoint detection and response (EDR) solutions to monitor for suspicious file opening behavior

🔍 How to Verify

Check if Vulnerable:

Check Substance3D Designer version via Help > About Substance3D Designer. If version is 14.1 or earlier, system is vulnerable.

Check Version:

Not applicable - check via application GUI

Verify Fix Applied:

Verify version is 14.2 or later in Help > About Substance3D Designer dialog.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with memory access violations
  • Unusual file opening events from Substance3D Designer process

Network Indicators:

  • Outbound connections from Substance3D Designer process to suspicious domains

SIEM Query:

process_name:"Substance3D Designer.exe" AND (event_type:"Process Creation" OR event_type:"File Access") AND file_extension:".sbsar" OR file_extension:".sbs"

🔗 References

📤 Share & Export