CVE-2025-54187

7.8 HIGH

📋 TL;DR

Substance3D Painter versions 11.0.2 and earlier contain an out-of-bounds write vulnerability that could allow arbitrary code execution when a user opens a malicious file. This affects users of Adobe's Substance3D Painter software who work with untrusted project files. Successful exploitation requires user interaction but could lead to full system compromise.

💻 Affected Systems

Products:
  • Adobe Substance3D Painter
Versions: 11.0.2 and earlier
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The vulnerability is triggered when opening malicious project files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with the current user's privileges, allowing installation of malware, data theft, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation leading to malware installation or data exfiltration from the affected workstation.

🟢

If Mitigated

Limited impact if proper application sandboxing and user privilege restrictions are in place, though some data loss may still occur.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening a malicious file) and knowledge of memory corruption techniques. No public exploits have been reported as of the advisory date.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.0.3 or later

Vendor Advisory: https://helpx.adobe.com/security/products/substance3d_painter/apsb25-77.html

Restart Required: Yes

Instructions:

1. Open Substance3D Painter. 2. Go to Help > Check for Updates. 3. Follow prompts to install version 11.0.3 or later. 4. Restart the application after installation completes.

🔧 Temporary Workarounds

Restrict file opening

all

Only open Substance3D Painter project files from trusted sources. Implement application control policies to block execution of malicious files.

Run with reduced privileges

all

Run Substance3D Painter with standard user privileges rather than administrative rights to limit potential damage from exploitation.

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized code
  • Use network segmentation to isolate workstations running vulnerable versions from critical systems

🔍 How to Verify

Check if Vulnerable:

Check the installed version of Substance3D Painter. If it's 11.0.2 or earlier, the system is vulnerable.

Check Version:

Open Substance3D Painter and go to Help > About Substance3D Painter

Verify Fix Applied:

Verify that Substance3D Painter version is 11.0.3 or later after applying the update.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with memory access violations
  • Unexpected process creation from Substance3D Painter

Network Indicators:

  • Unusual outbound connections from Substance3D Painter process

SIEM Query:

process_name:"Substance3D Painter.exe" AND (event_type:crash OR parent_process:unusual)

🔗 References

📤 Share & Export