Skip to main content

CVE-2025-27165: Out-of-bounds Read (CWE-125) in Adobe Substance3D - Stager

Medium
VulnerabilityCVE-2025-27165cvecve-2025-27165cwe-125
Published: Tue Jul 08 2025 (07/08/2025, 21:15:54 UTC)
Source: CVE Database V5
Vendor/Project: Adobe
Product: Substance3D - Stager

Description

Substance3D - Stager versions 3.1.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

AI-Powered Analysis

AILast updated: 07/15/2025, 21:49:43 UTC

Technical Analysis

CVE-2025-27165 is an out-of-bounds read vulnerability (CWE-125) affecting Adobe Substance3D - Stager versions 3.1.2 and earlier. This vulnerability arises when the application improperly handles memory boundaries while processing certain inputs, specifically when opening crafted malicious files. An out-of-bounds read can lead to the disclosure of sensitive memory contents, potentially exposing confidential information stored in the application's memory space. Exploitation requires user interaction, meaning a victim must actively open a maliciously crafted file for the vulnerability to be triggered. The CVSS v3.1 base score is 5.5, indicating a medium severity level. The attack vector is local (AV:L), requiring the attacker to have local access or deliver the malicious file to the user. No privileges are required (PR:N), but user interaction is necessary (UI:R). The impact is limited to confidentiality (C:H), with no impact on integrity or availability. There are no known exploits in the wild at the time of publication, and no patches have been linked yet. Given the nature of the vulnerability, it primarily threatens the confidentiality of sensitive data that may reside in memory during file processing within the Substance3D - Stager application.

Potential Impact

For European organizations, the impact of CVE-2025-27165 depends largely on the use of Adobe Substance3D - Stager within their workflows. This software is commonly used in 3D design, visualization, and content creation industries, including media, entertainment, architecture, and manufacturing sectors. Disclosure of sensitive memory could expose intellectual property, proprietary design data, or confidential project information, which could lead to competitive disadvantages or breaches of data protection regulations such as GDPR. Since exploitation requires user interaction, the risk is somewhat mitigated by user awareness and operational security practices. However, targeted attacks involving social engineering or spear-phishing to deliver malicious files could still pose a significant threat. The vulnerability does not affect system integrity or availability, so operational disruptions are unlikely. Nevertheless, the confidentiality breach potential is critical for organizations handling sensitive or regulated data in their 3D content pipelines.

Mitigation Recommendations

1. Immediate mitigation should focus on user education to avoid opening files from untrusted or unknown sources, especially unsolicited attachments or downloads related to 3D content. 2. Implement strict file validation and sandboxing policies for handling 3D files within the organization to limit exposure. 3. Monitor for updates from Adobe and apply patches promptly once available, as no official patch is currently linked. 4. Employ endpoint protection solutions capable of detecting anomalous behavior related to file processing in Substance3D - Stager. 5. Limit the use of Substance3D - Stager to trusted environments and consider network segmentation to reduce the risk of lateral movement if exploitation occurs. 6. Conduct regular security awareness training emphasizing the risks of social engineering and malicious file execution. 7. Review and enforce data protection policies to ensure sensitive design data is encrypted or otherwise protected in memory and at rest where possible.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
adobe
Date Reserved
2025-02-19T22:28:19.017Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686d8cfe6f40f0eb72fb9fda

Added to database: 7/8/2025, 9:26:22 PM

Last enriched: 7/15/2025, 9:49:43 PM

Last updated: 8/3/2025, 12:37:27 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats