CVE-2025-54280

7.8 HIGH

📋 TL;DR

Substance3D Viewer versions 0.25.2 and earlier contain an out-of-bounds write vulnerability that could allow attackers to execute arbitrary code on a victim's system. This affects users who open malicious files with the vulnerable software. Successful exploitation requires user interaction through opening a specially crafted file.

💻 Affected Systems

Products:
  • Adobe Substance3D Viewer
Versions: 0.25.2 and earlier
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable by default. The vulnerability is present in the core file parsing functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the victim's machine in the context of the current user, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Local privilege escalation or malware installation on individual workstations where users open malicious Substance3D files from untrusted sources.

🟢

If Mitigated

No impact if users only open trusted files from verified sources and the application runs with limited privileges.

🌐 Internet-Facing: LOW - The vulnerability requires local file execution and cannot be directly exploited over the network.
🏢 Internal Only: MEDIUM - Risk exists within organizations where users might open files from untrusted internal sources or compromised shares.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file) and knowledge of the file format structure to trigger the out-of-bounds write condition.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.25.3 or later

Vendor Advisory: https://helpx.adobe.com/security/products/substance3d-viewer/apsb25-99.html

Restart Required: Yes

Instructions:

1. Open Substance3D Viewer. 2. Go to Help > Check for Updates. 3. Follow prompts to install version 0.25.3 or later. 4. Restart the application after installation completes.

🔧 Temporary Workarounds

Restrict file types

all

Configure system to only allow trusted .sbsar or other Substance3D file extensions from verified sources

Run with limited privileges

all

Run Substance3D Viewer with standard user privileges instead of administrative rights

🧯 If You Can't Patch

  • Discontinue use of Substance3D Viewer until patched and use alternative 3D viewing software
  • Implement application whitelisting to block execution of Substance3D Viewer entirely

🔍 How to Verify

Check if Vulnerable:

Check the version in Substance3D Viewer under Help > About. If version is 0.25.2 or earlier, the system is vulnerable.

Check Version:

On Windows: Check registry at HKEY_LOCAL_MACHINE\SOFTWARE\Adobe\Substance3D Viewer\Version. On macOS/Linux: Check application info or package manager.

Verify Fix Applied:

Verify the version shows 0.25.3 or later in Help > About after updating.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with memory access violations
  • Unexpected child processes spawned from Substance3D Viewer
  • File access to unusual locations by the viewer process

Network Indicators:

  • Outbound connections from Substance3D Viewer to unexpected destinations after file opening

SIEM Query:

process_name:"Substance3D Viewer" AND (event_type:crash OR child_process_count > 1)

🔗 References

📤 Share & Export