Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49573: Out-of-bounds Write (CWE-787) in Adobe Substance3D - Modeler

0
High
VulnerabilityCVE-2025-49573cvecve-2025-49573cwe-787
Published: Tue Aug 12 2025 (08/12/2025, 20:36:14 UTC)
Source: CVE Database V5
Vendor/Project: Adobe
Product: Substance3D - Modeler

Description

Substance3D - Modeler versions 1.22.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 03:01:56 UTC

Technical Analysis

CVE-2025-49573 is an out-of-bounds write vulnerability classified under CWE-787 affecting Adobe Substance3D - Modeler versions 1.22.0 and earlier. The vulnerability arises when the software improperly handles memory boundaries while processing certain file inputs, allowing an attacker to write data outside the intended buffer. This memory corruption can lead to arbitrary code execution within the context of the current user. The attack vector requires the victim to open a maliciously crafted file, which triggers the vulnerability. The CVSS 3.1 base score of 7.8 indicates a high severity, with the vector metrics showing local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits are known at this time, the vulnerability poses a significant risk due to the potential for full system compromise. Adobe has not yet released a patch, so users must rely on mitigation strategies until an update is available. The vulnerability affects a specialized 3D modeling tool widely used in creative industries, making it a target for attackers seeking to compromise design workflows or intellectual property.

Potential Impact

If exploited, this vulnerability can lead to arbitrary code execution with the privileges of the current user, potentially allowing attackers to steal sensitive data, alter or destroy files, and disrupt operations. Since the vulnerability affects a creative design tool, intellectual property theft and sabotage of design projects are significant concerns. The requirement for user interaction limits mass exploitation but targeted attacks against designers, studios, or organizations using Substance3D - Modeler could result in serious breaches. The high impact on confidentiality, integrity, and availability means that compromised systems could be fully controlled by attackers, leading to data loss, espionage, or ransomware deployment. Organizations relying on Adobe Substance3D - Modeler in their production pipelines face risks to operational continuity and reputation if exploited.

Mitigation Recommendations

Until Adobe releases an official patch, organizations should implement strict controls on file sources by restricting the opening of files from untrusted or unknown origins within Substance3D - Modeler. Employ application whitelisting and sandboxing techniques to isolate the software and limit the impact of potential exploitation. Enhance user awareness training to recognize suspicious files and phishing attempts that might deliver malicious payloads. Monitor systems for unusual behavior indicative of exploitation attempts, such as unexpected process launches or memory anomalies. Use endpoint detection and response (EDR) solutions to detect and block exploitation attempts in real-time. Regularly back up critical design files and maintain offline copies to mitigate data loss. Once a patch is available, prioritize timely deployment across all affected systems to eliminate the vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
adobe
Date Reserved
2025-06-06T15:42:09.519Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689ba87aad5a09ad00367c51

Added to database: 8/12/2025, 8:47:54 PM

Last enriched: 2/27/2026, 3:01:56 AM

Last updated: 3/21/2026, 11:39:42 PM

Views: 77

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses