CVE-2025-54192
📋 TL;DR
Substance3D Painter versions 11.0.2 and earlier contain an out-of-bounds read vulnerability that could allow attackers to read sensitive memory contents. Users who open malicious files with affected versions are vulnerable to potential information disclosure.
💻 Affected Systems
- Adobe Substance3D Painter
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Sensitive application memory, potentially containing authentication tokens, encryption keys, or other confidential data, could be exfiltrated by an attacker.
Likely Case
Limited memory disclosure that might reveal application state or non-critical data, but could be combined with other vulnerabilities for more severe attacks.
If Mitigated
With proper file handling controls and user awareness, the risk is limited to accidental opening of untrusted files.
🎯 Exploit Status
Requires user to open a specially crafted malicious file. No authentication bypass needed but requires social engineering.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 11.0.3 or later
Vendor Advisory: https://helpx.adobe.com/security/products/substance3d_painter/apsb25-77.html
Restart Required: No
Instructions:
1. Open Substance3D Painter. 2. Go to Help > Check for Updates. 3. Follow prompts to install version 11.0.3 or later. 4. Alternatively, download latest version from Adobe Creative Cloud.
🔧 Temporary Workarounds
Restrict file opening
allOnly open Substance3D Painter files from trusted sources. Implement application whitelisting to prevent execution of malicious files.
🧯 If You Can't Patch
- Implement strict file handling policies: only open .spp files from verified sources
- Use endpoint protection that can detect and block malicious Substance3D Painter files
🔍 How to Verify
Check if Vulnerable:
Check Substance3D Painter version in Help > About. If version is 11.0.2 or earlier, you are vulnerable.
Check Version:
On Windows: Check Help > About in Substance3D Painter GUI. No direct command-line version check available.
Verify Fix Applied:
Verify version is 11.0.3 or later in Help > About. No specific vulnerability check exists beyond version verification.
📡 Detection & Monitoring
Log Indicators:
- Application crashes when opening files
- Unusual memory access patterns in application logs
Network Indicators:
- Outbound connections after opening Substance3D Painter files from untrusted sources
SIEM Query:
EventID for application crashes related to Substance3D Painter OR file opens of .spp extension from untrusted locations