CVE-2025-54189

5.5 MEDIUM

📋 TL;DR

Substance3D Painter versions 11.0.2 and earlier contain an out-of-bounds read vulnerability that could allow attackers to read sensitive memory contents. This affects users who open malicious project files, potentially exposing confidential data like passwords or encryption keys. Only users of Substance3D Painter 11.0.2 and earlier are vulnerable.

💻 Affected Systems

Products:
  • Adobe Substance3D Painter
Versions: 11.0.2 and earlier
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable by default. The vulnerability requires user interaction to open a malicious file.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could read sensitive memory contents including passwords, encryption keys, or other confidential data from the application's memory space, potentially leading to credential theft or further system compromise.

🟠

Likely Case

Limited information disclosure from the application's memory, potentially exposing some user data or system information but unlikely to lead to full system compromise.

🟢

If Mitigated

With proper controls, the impact is minimal as it requires user interaction and only affects the application's memory space, not the underlying operating system.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening a malicious file) and knowledge of memory layout. No public exploits are known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.0.3 or later

Vendor Advisory: https://helpx.adobe.com/security/products/substance3d_painter/apsb25-77.html

Restart Required: No

Instructions:

1. Open Substance3D Painter. 2. Go to Help > Check for Updates. 3. Install version 11.0.3 or later. 4. Alternatively, download the latest version from Adobe's website.

🔧 Temporary Workarounds

Restrict file sources

all

Only open Substance3D Painter files from trusted sources and avoid opening files from unknown or untrusted origins.

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of older vulnerable versions
  • Use network segmentation to isolate systems running vulnerable versions from sensitive data

🔍 How to Verify

Check if Vulnerable:

Check the version in Substance3D Painter by going to Help > About Substance3D Painter. If the version is 11.0.2 or earlier, the system is vulnerable.

Check Version:

Not applicable - check through application GUI

Verify Fix Applied:

After updating, verify the version is 11.0.3 or later in Help > About Substance3D Painter.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes or unusual memory access patterns in application logs
  • Unexpected file opening events from untrusted sources

Network Indicators:

  • Downloads of Substance3D Painter project files from untrusted sources

SIEM Query:

source="application_logs" AND (process="Substance3D Painter" AND (event="crash" OR event="memory_access_violation"))

🔗 References

📤 Share & Export