Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21300: NULL Pointer Dereference (CWE-476) in Adobe Substance3D - Modeler

0
Medium
VulnerabilityCVE-2026-21300cvecve-2026-21300cwe-476
Published: Tue Jan 13 2026 (01/13/2026, 20:20:18 UTC)
Source: CVE Database V5
Vendor/Project: Adobe
Product: Substance3D - Modeler

Description

Substance3D - Modeler versions 1.22.4 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

AI-Powered Analysis

AILast updated: 01/14/2026, 00:28:23 UTC

Technical Analysis

CVE-2026-21300 is a NULL Pointer Dereference vulnerability identified in Adobe Substance3D - Modeler versions 1.22.4 and earlier. This vulnerability arises when the application attempts to dereference a null pointer, typically due to insufficient validation of input data from files opened by the user. When exploited, this leads to an application crash, causing denial-of-service (DoS) conditions. The vulnerability requires user interaction, specifically the opening of a maliciously crafted file designed to trigger the null pointer dereference. The CVSS v3.1 base score is 5.5 (medium severity), reflecting that the attack vector is local (AV:L), with low attack complexity (AC:L), no privileges required (PR:N), but user interaction is necessary (UI:R). The impact is limited to availability (A:H), with no confidentiality or integrity impact. No known exploits have been reported in the wild, and Adobe has not yet released a patch. The vulnerability is classified under CWE-476, which covers NULL Pointer Dereference issues that can cause crashes or unpredictable behavior. This vulnerability primarily affects the stability and availability of the Substance3D - Modeler application, which is widely used in 3D modeling and digital content creation workflows.

Potential Impact

For European organizations, particularly those in digital media, animation, game development, and design sectors that rely on Adobe Substance3D - Modeler, this vulnerability could disrupt workflows by causing application crashes when opening files. Although it does not compromise data confidentiality or integrity, the denial-of-service effect can lead to productivity losses and potential delays in project delivery. In environments where Substance3D - Modeler is integrated into automated pipelines or collaborative workflows, repeated crashes could affect operational continuity. The requirement for user interaction limits remote exploitation, but targeted attacks via malicious files sent through email or shared storage remain possible. The absence of known exploits reduces immediate risk, but the lack of a patch means organizations must rely on preventive controls. The impact is thus moderate but relevant for organizations with high dependency on this software.

Mitigation Recommendations

Organizations should implement strict controls on file sources, ensuring that only trusted files are opened in Adobe Substance3D - Modeler. User training to recognize suspicious or unexpected files can reduce the risk of inadvertent exploitation. Employing sandboxing or running the application in isolated environments can limit the impact of crashes. Monitoring application stability and logs for frequent crashes may help detect attempted exploitation. Since no patch is currently available, organizations should track Adobe’s security advisories closely for updates. Additionally, integrating file scanning solutions that detect malformed or malicious files before they reach end users can provide a proactive defense. Where possible, limiting the use of Substance3D - Modeler to essential personnel and restricting file sharing channels can reduce exposure. Backup and recovery plans should be reviewed to minimize disruption from potential denial-of-service events.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
adobe
Date Reserved
2025-12-12T22:01:18.191Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6966e30ba60475309f63f224

Added to database: 1/14/2026, 12:27:55 AM

Last enriched: 1/14/2026, 12:28:23 AM

Last updated: 1/14/2026, 2:39:01 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats