CVE-2025-30322

7.8 HIGH

📋 TL;DR

CVE-2025-30322 is an out-of-bounds write vulnerability in Substance3D Painter that could allow arbitrary code execution when a user opens a malicious file. This affects users of Substance3D Painter versions 11.0 and earlier. Attackers could exploit this to run code with the victim's privileges.

💻 Affected Systems

Products:
  • Adobe Substance 3D Painter
Versions: 11.0 and earlier
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable by default when opening project files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via arbitrary code execution leading to data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Malware installation or data exfiltration when users open specially crafted malicious project files.

🟢

If Mitigated

Limited impact if users only open trusted files from verified sources and have endpoint protection.

🌐 Internet-Facing: LOW - Exploitation requires user interaction with malicious files, not network exposure.
🏢 Internal Only: MEDIUM - Internal users could be targeted via phishing or shared malicious files.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file) and crafting a file that triggers the out-of-bounds write.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.1 or later

Vendor Advisory: https://helpx.adobe.com/security/products/substance3d_painter/apsb25-38.html

Restart Required: Yes

Instructions:

1. Open Substance 3D Painter. 2. Go to Help > Check for Updates. 3. Install version 11.1 or later. 4. Restart the application.

🔧 Temporary Workarounds

Restrict file opening

all

Only open Substance 3D Painter files from trusted sources and verify file integrity before opening.

Application control

all

Use application whitelisting to restrict execution of older vulnerable versions.

🧯 If You Can't Patch

  • Implement strict file validation policies for Substance 3D Painter project files
  • Use endpoint detection and response (EDR) to monitor for suspicious process execution

🔍 How to Verify

Check if Vulnerable:

Check Substance 3D Painter version via Help > About. If version is 11.0 or earlier, you are vulnerable.

Check Version:

Not applicable - check via application GUI Help > About menu

Verify Fix Applied:

Verify version is 11.1 or later in Help > About after updating.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process execution from Substance 3D Painter
  • File access errors or crashes in application logs

Network Indicators:

  • Unusual outbound connections after opening project files

SIEM Query:

Process creation where parent_process contains 'painter' AND (process contains 'cmd' OR process contains 'powershell' OR process contains 'bash')

🔗 References

📤 Share & Export