Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21300: NULL Pointer Dereference (CWE-476) in Adobe Substance3D - Modeler

0
Medium
VulnerabilityCVE-2026-21300cvecve-2026-21300cwe-476
Published: Tue Jan 13 2026 (01/13/2026, 20:20:18 UTC)
Source: CVE Database V5
Vendor/Project: Adobe
Product: Substance3D - Modeler

Description

CVE-2026-21300 is a medium severity NULL Pointer Dereference vulnerability in Adobe Substance3D - Modeler versions 1. 22. 4 and earlier. This flaw can cause the application to crash, resulting in a denial-of-service condition. Exploitation requires user interaction, specifically opening a crafted malicious file. The vulnerability impacts availability but does not affect confidentiality or integrity. No known exploits are currently in the wild, and no patches have been published yet. The vulnerability is limited to local attack vectors since it requires user action and no privileges are needed. European organizations using Adobe Substance3D - Modeler, especially in creative and design sectors, should be aware of potential disruption risks. Mitigation involves cautious handling of untrusted files and monitoring for updates from Adobe.

AI-Powered Analysis

AILast updated: 01/21/2026, 02:31:37 UTC

Technical Analysis

CVE-2026-21300 is a NULL Pointer Dereference vulnerability (CWE-476) identified in Adobe Substance3D - Modeler, affecting versions 1.22.4 and earlier. This vulnerability arises when the application attempts to access or dereference a pointer that has a NULL value, leading to an application crash and denial-of-service (DoS) condition. The attack vector requires local user interaction, specifically the opening of a maliciously crafted file designed to trigger the NULL pointer dereference. The vulnerability does not compromise confidentiality or integrity but impacts availability by causing the application to terminate unexpectedly. The CVSS v3.1 base score is 5.5 (medium severity), reflecting the limited attack vector (local), low complexity, no privileges required, and user interaction needed. No known exploits have been reported in the wild, and Adobe has not yet released a patch. The vulnerability is relevant primarily to users of the Substance3D - Modeler software, which is used in 3D modeling and digital content creation workflows. Given the nature of the flaw, attackers could disrupt creative workflows by causing application crashes, potentially impacting productivity and operational continuity in environments relying on this software.

Potential Impact

For European organizations, the primary impact of CVE-2026-21300 is the potential disruption of digital content creation workflows due to application crashes. This can lead to productivity losses, especially in sectors heavily reliant on 3D modeling and design such as media, entertainment, advertising, and manufacturing design. While the vulnerability does not expose sensitive data or allow code execution, repeated denial-of-service conditions could degrade user experience and delay project timelines. Organizations using Substance3D - Modeler in collaborative environments may face operational bottlenecks if multiple users are affected. The requirement for user interaction limits remote exploitation, reducing the risk of widespread automated attacks. However, targeted attacks via malicious files sent through email or file sharing could still pose a threat. The absence of a patch means organizations must rely on interim mitigations until Adobe releases an update. Overall, the impact is moderate but relevant for creative industries and agencies using this software in Europe.

Mitigation Recommendations

1. Educate users to avoid opening files from untrusted or unknown sources, especially unsolicited attachments or downloads related to Substance3D - Modeler. 2. Implement strict file scanning and sandboxing of files before they are opened in the application to detect potentially malicious content. 3. Use application whitelisting and restrict installation of unauthorized software to limit exposure. 4. Monitor Adobe’s security advisories closely for the release of patches or updates addressing this vulnerability and apply them promptly. 5. Consider isolating workstations running Substance3D - Modeler from critical network segments to reduce potential impact of denial-of-service conditions. 6. Maintain regular backups of project files and configurations to minimize disruption in case of application crashes. 7. Employ endpoint detection and response (EDR) tools to identify abnormal application behavior that could indicate exploitation attempts. 8. Coordinate with IT and security teams to establish incident response procedures specific to application availability issues caused by this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
adobe
Date Reserved
2025-12-12T22:01:18.191Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6966e30ba60475309f63f224

Added to database: 1/14/2026, 12:27:55 AM

Last enriched: 1/21/2026, 2:31:37 AM

Last updated: 2/7/2026, 5:17:16 AM

Views: 47

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats