Skip to main content

CVE-2025-54191: Out-of-bounds Read (CWE-125) in Adobe Substance3D - Painter

Medium
VulnerabilityCVE-2025-54191cvecve-2025-54191cwe-125
Published: Tue Aug 12 2025 (08/12/2025, 20:44:26 UTC)
Source: CVE Database V5
Vendor/Project: Adobe
Product: Substance3D - Painter

Description

Substance3D - Painter versions 11.0.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

AI-Powered Analysis

AILast updated: 08/20/2025, 02:15:26 UTC

Technical Analysis

CVE-2025-54191 is an out-of-bounds read vulnerability (CWE-125) affecting Adobe Substance3D - Painter versions 11.0.2 and earlier. This vulnerability arises when the software improperly handles memory boundaries, allowing an attacker to read memory locations outside the intended buffer. Exploitation requires user interaction, specifically that the victim opens a maliciously crafted file designed to trigger the out-of-bounds read. Successful exploitation can lead to disclosure of sensitive memory contents, potentially exposing confidential data such as cryptographic keys, personal information, or other sensitive application data. The vulnerability does not allow modification of data or denial of service, but the confidentiality impact is high due to the potential leakage of sensitive information. The CVSS 3.1 base score is 5.5 (medium severity), reflecting the requirement for local access (AV:L), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), high confidentiality impact (C:H), no integrity impact (I:N), and no availability impact (A:N). No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability is significant for users of Adobe Substance3D - Painter, a professional 3D texturing tool widely used in creative industries for digital content creation.

Potential Impact

For European organizations, the impact of this vulnerability depends on the extent of Adobe Substance3D - Painter usage within creative, design, gaming, and media production sectors. Disclosure of sensitive memory could lead to leakage of proprietary design assets, intellectual property, or user credentials stored in memory, potentially resulting in competitive disadvantage or data breaches. Since exploitation requires user interaction and opening a malicious file, targeted spear-phishing or supply chain attacks could be vectors. Organizations handling sensitive or regulated data (e.g., GDPR-protected personal data) could face compliance risks if confidential information is exposed. The medium severity score indicates a moderate risk, but the confidentiality impact is high, which is critical for industries relying on confidentiality of digital assets. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time.

Mitigation Recommendations

European organizations should implement the following specific measures: 1) Restrict and monitor the use of Adobe Substance3D - Painter to trusted users and environments, minimizing exposure. 2) Educate users on the risks of opening files from untrusted sources, emphasizing the need for caution with files received via email or external media. 3) Employ application whitelisting and sandboxing to limit the impact of malicious files. 4) Monitor network and endpoint logs for unusual activity related to Substance3D - Painter processes. 5) Coordinate with Adobe for timely updates and patches; apply them promptly once available. 6) Use Data Loss Prevention (DLP) tools to detect potential leakage of sensitive data. 7) Implement strict access controls and segmentation for systems running this software to reduce lateral movement in case of compromise. 8) Consider file integrity monitoring on directories where Substance3D - Painter project files are stored to detect unauthorized modifications.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
adobe
Date Reserved
2025-07-17T21:15:02.447Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689bac15ad5a09ad0036c6da

Added to database: 8/12/2025, 9:03:17 PM

Last enriched: 8/20/2025, 2:15:26 AM

Last updated: 8/28/2025, 6:07:55 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats