CVE-2025-61807

7.8 HIGH

📋 TL;DR

CVE-2025-61807 is an integer overflow vulnerability in Substance3D Stager that allows arbitrary code execution when a user opens a malicious file. This affects users of Substance3D Stager version 3.1.4 and earlier. Successful exploitation requires user interaction but gives attackers full control of the affected system under the current user's privileges.

💻 Affected Systems

Products:
  • Adobe Substance3D Stager
Versions: 3.1.4 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable by default when processing malicious files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the logged-in user, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation leading to malware installation, data exfiltration, or persistence mechanisms being established on the compromised workstation.

🟢

If Mitigated

Limited impact due to application sandboxing or restricted user permissions, potentially resulting in application crash rather than code execution.

🌐 Internet-Facing: LOW - Exploitation requires user interaction with malicious files, not direct network exposure.
🏢 Internal Only: MEDIUM - Internal users could be targeted via phishing or shared malicious files, but requires user interaction.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file) and understanding of the integer overflow condition to achieve code execution.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.1.5 or later

Vendor Advisory: https://helpx.adobe.com/security/products/substance3d_stager/apsb25-104.html

Restart Required: Yes

Instructions:

1. Open Substance3D Stager. 2. Go to Help > Check for Updates. 3. Follow prompts to install version 3.1.5 or later. 4. Restart the application.

🔧 Temporary Workarounds

Restrict file opening

all

Only open Substance3D Stager files from trusted sources and avoid opening unknown .sbsar or other project files.

Application sandboxing

all

Run Substance3D Stager in a sandboxed environment or with reduced privileges to limit potential damage.

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized code
  • Use endpoint detection and response (EDR) solutions to monitor for suspicious file opening behavior

🔍 How to Verify

Check if Vulnerable:

Check Substance3D Stager version in Help > About. If version is 3.1.4 or earlier, the system is vulnerable.

Check Version:

Not applicable - check via application GUI Help > About menu

Verify Fix Applied:

Verify version is 3.1.5 or later in Help > About after updating.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with memory access violations
  • Unexpected child processes spawned from Substance3D Stager

Network Indicators:

  • Outbound connections from Substance3D Stager to unexpected destinations after file opening

SIEM Query:

process_name:"Substance3D Stager.exe" AND (event_id:1000 OR event_id:1001) OR process_parent_name:"Substance3D Stager.exe"

🔗 References

📤 Share & Export