CVE-2025-64531

7.8 HIGH

📋 TL;DR

A use-after-free vulnerability in Substance3D Stager versions 3.1.5 and earlier allows attackers to execute arbitrary code when a user opens a malicious file. This affects all users running vulnerable versions of Adobe's Substance3D Stager software. Successful exploitation requires user interaction but could lead to full system compromise.

💻 Affected Systems

Products:
  • Adobe Substance3D Stager
Versions: 3.1.5 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable by default. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with attacker gaining the same privileges as the logged-in user, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Local privilege escalation leading to malware installation, data exfiltration, or persistence mechanisms being established on the affected system.

🟢

If Mitigated

Limited impact due to proper file validation, user awareness training, and restricted user privileges preventing full system compromise.

🌐 Internet-Facing: LOW - Exploitation requires local file access and user interaction, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Internal users could be targeted via phishing or malicious file shares, but requires user interaction.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user to open a malicious file. No public exploit code available as of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.1.6 or later

Vendor Advisory: https://helpx.adobe.com/security/products/substance3d_stager/apsb25-113.html

Restart Required: Yes

Instructions:

1. Open Adobe Creative Cloud application. 2. Navigate to 'Apps' section. 3. Find Substance3D Stager and click 'Update'. 4. Restart computer after update completes.

🔧 Temporary Workarounds

Restrict file opening

all

Prevent users from opening untrusted .sbsar or other Substance3D files from unknown sources

Application control

windows

Use application whitelisting to restrict execution of Substance3D Stager to trusted users only

🧯 If You Can't Patch

  • Implement strict file validation policies to block untrusted Substance3D files
  • Run Substance3D Stager with limited user privileges to reduce impact scope

🔍 How to Verify

Check if Vulnerable:

Open Substance3D Stager, go to Help > About, check if version is 3.1.5 or earlier

Check Version:

On Windows: Check Add/Remove Programs for Substance3D Stager version. On macOS: Check Applications folder for version info.

Verify Fix Applied:

Verify version is 3.1.6 or later in Help > About menu

📡 Detection & Monitoring

Log Indicators:

  • Application crashes in Substance3D Stager
  • Unusual file access patterns from Substance3D process

Network Indicators:

  • Outbound connections from Substance3D Stager to unknown IPs post-file opening

SIEM Query:

process_name:"Substance3D Stager.exe" AND (event_type:crash OR file_path:*.sbsar)

🔗 References

📤 Share & Export