CVE-2025-43569

7.8 HIGH

📋 TL;DR

CVE-2025-43569 is an out-of-bounds write vulnerability in Substance3D Stager that allows arbitrary code execution when a user opens a malicious file. This affects all users running Substance3D Stager version 3.1.1 or earlier, potentially giving attackers full control of the victim's system within the current user context.

💻 Affected Systems

Products:
  • Adobe Substance3D Stager
Versions: 3.1.1 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The vulnerability requires user interaction to open a malicious file.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the logged-in user, leading to data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Local privilege escalation leading to malware installation, credential harvesting, or lateral movement within the network.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions, potentially containing the exploit to the application's context.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file) and knowledge of file format manipulation. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.1.2 or later

Vendor Advisory: https://helpx.adobe.com/security/products/substance3d_stager/apsb25-46.html

Restart Required: Yes

Instructions:

1. Open Substance3D Stager. 2. Go to Help > Check for Updates. 3. Install available updates. 4. Restart the application. Alternatively, download the latest version from Adobe's website and perform a fresh installation.

🔧 Temporary Workarounds

Restrict file opening

all

Prevent users from opening untrusted Substance3D Stager files by implementing application control policies.

Run with reduced privileges

all

Configure Substance3D Stager to run with limited user privileges to reduce impact of successful exploitation.

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized binaries
  • Deploy endpoint detection and response (EDR) solutions to monitor for suspicious file opening behavior

🔍 How to Verify

Check if Vulnerable:

Check Substance3D Stager version in the application's About dialog or Help menu. If version is 3.1.1 or earlier, the system is vulnerable.

Check Version:

On Windows: Check Help > About in Substance3D Stager. On macOS: Substance3D Stager > About Substance3D Stager.

Verify Fix Applied:

Verify the application version is 3.1.2 or later after applying updates.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file opening events in Substance3D Stager logs
  • Process creation anomalies following file opening

Network Indicators:

  • Outbound connections from Substance3D Stager to unknown IPs following file opening

SIEM Query:

process_name:"Substance3D Stager" AND event_type:"file_open" AND file_extension:(".sbsar" OR ".sbs" OR ".sbsprs")

🔗 References

📤 Share & Export