CVE-2025-54262

7.8 HIGH

📋 TL;DR

Substance3D Stager versions 3.1.3 and earlier contain an out-of-bounds read vulnerability when parsing malicious files. This could allow an attacker to execute arbitrary code with the privileges of the current user. Users who open untrusted files with affected versions are at risk.

💻 Affected Systems

Products:
  • Adobe Substance 3D Stager
Versions: 3.1.3 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable when opening files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via arbitrary code execution with user privileges, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Application crash or limited information disclosure from memory reads, with potential for code execution if combined with other vulnerabilities.

🟢

If Mitigated

No impact if users don't open untrusted files or if application is patched.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file). No public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.1.4 or later

Vendor Advisory: https://helpx.adobe.com/security/products/substance3d_stager/apsb25-81.html

Restart Required: Yes

Instructions:

1. Open Adobe Creative Cloud application. 2. Navigate to Apps tab. 3. Find Substance 3D Stager. 4. Click Update to install version 3.1.4 or later. 5. Restart the application.

🔧 Temporary Workarounds

Restrict file opening

all

Configure application to only open trusted files from known sources.

Application sandboxing

all

Run Substance 3D Stager in a sandboxed environment to limit potential damage.

🧯 If You Can't Patch

  • Disable Substance 3D Stager until patching is possible.
  • Implement application control to block execution of vulnerable versions.

🔍 How to Verify

Check if Vulnerable:

Check Substance 3D Stager version in application settings or About dialog.

Check Version:

On Windows: Check Help > About in application. On macOS: Substance 3D Stager > About Substance 3D Stager.

Verify Fix Applied:

Verify version is 3.1.4 or later after update.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when opening files
  • Unexpected memory access errors in application logs

Network Indicators:

  • File downloads from untrusted sources followed by application launch

SIEM Query:

process_name:"Substance 3D Stager.exe" AND (event_id:1000 OR event_id:1001) OR file_hash:malicious_hash

🔗 References

📤 Share & Export