CVE-2025-43551

5.5 MEDIUM

📋 TL;DR

Substance3D Stager versions 3.1.1 and earlier contain an out-of-bounds read vulnerability that could allow attackers to read sensitive memory contents and potentially bypass ASLR protections. Users who open malicious files with affected versions are vulnerable. This primarily affects 3D artists and designers using Adobe's Substance3D Stager software.

💻 Affected Systems

Products:
  • Adobe Substance3D Stager
Versions: 3.1.1 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable when processing malicious files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Memory disclosure could reveal sensitive information like credentials, encryption keys, or proprietary data, potentially enabling further attacks including code execution bypassing ASLR.

🟠

Likely Case

Limited information disclosure from memory, potentially revealing some application data but unlikely to lead directly to full system compromise without additional vulnerabilities.

🟢

If Mitigated

With proper controls, impact is limited to potential disclosure of some application memory contents without escalation to code execution.

🌐 Internet-Facing: LOW - Exploitation requires user interaction to open malicious files, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Internal users could be targeted via phishing or shared malicious files, but requires user interaction.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file) and understanding of memory layout to leverage disclosed information.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.1.2 or later

Vendor Advisory: https://helpx.adobe.com/security/products/substance3d_stager/apsb25-46.html

Restart Required: Yes

Instructions:

1. Open Substance3D Stager. 2. Go to Help > Check for Updates. 3. Install available updates. 4. Restart the application.

🔧 Temporary Workarounds

Restrict file sources

all

Only open Substance3D Stager files from trusted sources

Application sandboxing

all

Run Substance3D Stager in restricted environment/sandbox

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized files
  • Use email/web filtering to block potentially malicious attachments

🔍 How to Verify

Check if Vulnerable:

Check Substance3D Stager version in application (Help > About) - if version is 3.1.1 or earlier, it's vulnerable.

Check Version:

Not applicable - check via application GUI Help > About

Verify Fix Applied:

Verify version is 3.1.2 or later in Help > About menu.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when opening files
  • Unusual memory access patterns in application logs

Network Indicators:

  • Downloads of suspicious Substance3D Stager files from untrusted sources

SIEM Query:

EventID for application crashes with Substance3D Stager process

🔗 References

📤 Share & Export