Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54275: Out-of-bounds Write (CWE-787) in Adobe Substance3D - Viewer

0
Medium
VulnerabilityCVE-2025-54275cvecve-2025-54275cwe-787
Published: Tue Oct 14 2025 (10/14/2025, 19:07:37 UTC)
Source: CVE Database V5
Vendor/Project: Adobe
Product: Substance3D - Viewer

Description

Substance3D - Viewer versions 0.25.2 and earlier are affected by an out-of-bounds write vulnerability that could lead to application denial-of-service. An attacker could leverage this vulnerability to crash the application or make it unavailable. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

AI-Powered Analysis

AILast updated: 10/14/2025, 19:20:18 UTC

Technical Analysis

CVE-2025-54275 identifies an out-of-bounds write vulnerability (CWE-787) in Adobe Substance3D - Viewer, a software tool used for viewing 3D content. The vulnerability exists in versions 0.25.2 and earlier, where improper bounds checking during file processing allows an attacker to write data outside the intended memory buffer. This memory corruption can cause the application to crash, resulting in a denial-of-service condition. Exploitation requires that a victim user opens a maliciously crafted file, making user interaction necessary. The vulnerability does not allow for code execution or data leakage but impacts application availability. The CVSS 3.1 base score is 5.5, reflecting a medium severity with attack vector local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), no confidentiality or integrity impact (C:N/I:N), and high availability impact (A:H). No patches or exploits are currently known, but the risk lies in potential disruption of workflows relying on the Substance3D - Viewer application. The vulnerability highlights the importance of secure memory handling in file parsing components of creative software.

Potential Impact

For European organizations, especially those in digital media, design, and manufacturing sectors that utilize Adobe Substance3D - Viewer, this vulnerability could lead to operational disruptions due to application crashes. While it does not compromise sensitive data or allow unauthorized code execution, denial-of-service conditions can delay project timelines and reduce productivity. Organizations relying on automated or batch processing of 3D files may experience interruptions if malicious or malformed files are introduced, whether inadvertently or through targeted attacks. The requirement for user interaction limits large-scale automated exploitation but does not eliminate risk from social engineering or insider threats. The impact is primarily on availability, which can be critical in time-sensitive creative workflows and collaborative environments common in European creative industries.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement strict file handling policies, including verifying the source and integrity of 3D files before opening them in Substance3D - Viewer. User training to recognize suspicious files and avoid opening untrusted attachments is essential. Employ application whitelisting and sandboxing techniques to isolate the viewer application and limit the impact of crashes. Monitor Adobe’s security advisories closely for patches or updates addressing this vulnerability and apply them promptly once available. Additionally, consider using alternative tools or workflows that do not rely solely on the vulnerable software until a fix is released. Implementing endpoint detection and response (EDR) solutions can help detect abnormal application crashes that may indicate exploitation attempts. Regular backups of critical project files ensure recovery in case of disruption.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
adobe
Date Reserved
2025-07-17T21:15:02.466Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68eea212ae73b78941ef555a

Added to database: 10/14/2025, 7:18:42 PM

Last enriched: 10/14/2025, 7:20:18 PM

Last updated: 10/14/2025, 7:36:22 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats