Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21301: NULL Pointer Dereference (CWE-476) in Adobe Substance3D - Modeler

0
Medium
VulnerabilityCVE-2026-21301cvecve-2026-21301cwe-476
Published: Tue Jan 13 2026 (01/13/2026, 20:20:20 UTC)
Source: CVE Database V5
Vendor/Project: Adobe
Product: Substance3D - Modeler

Description

CVE-2026-21301 is a medium severity NULL Pointer Dereference vulnerability in Adobe Substance3D - Modeler versions 1. 22. 4 and earlier. It can cause an application denial-of-service (DoS) when a user opens a specially crafted malicious file. Exploitation requires user interaction but no privileges or authentication. The vulnerability impacts availability but not confidentiality or integrity. No known exploits are currently in the wild, and no patches have been released yet. European organizations using Substance3D - Modeler, especially in creative industries, may face disruption risks. Mitigation involves restricting file sources, user training, and monitoring application stability. Countries with strong digital media sectors and Adobe product usage, such as Germany, France, and the UK, are more likely to be affected.

AI-Powered Analysis

AILast updated: 01/21/2026, 02:53:58 UTC

Technical Analysis

CVE-2026-21301 identifies a NULL Pointer Dereference vulnerability (CWE-476) in Adobe Substance3D - Modeler versions 1.22.4 and earlier. This vulnerability arises when the application attempts to dereference a null pointer due to insufficient validation of input data, specifically when processing maliciously crafted files. The result is an application crash leading to denial-of-service (DoS), impacting the availability of the software. Exploitation requires user interaction, as the victim must open a malicious file, and no elevated privileges or authentication are necessary. The CVSS v3.1 score of 5.5 reflects a medium severity, with an attack vector of local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), and user interaction required (UI:R). The vulnerability does not affect confidentiality or integrity but solely impacts availability. There are currently no known exploits in the wild, and Adobe has not yet released a patch. The vulnerability is particularly relevant to users of Substance3D - Modeler, a 3D modeling tool widely used in creative and design industries. The lack of patch and the requirement for user interaction somewhat limit the risk, but the potential for disruption remains significant in environments relying heavily on this software for production workflows.

Potential Impact

For European organizations, the primary impact of CVE-2026-21301 is the potential denial-of-service of Adobe Substance3D - Modeler, which could disrupt creative workflows, delay project timelines, and cause productivity losses. Organizations in digital media, game development, animation, and industrial design sectors are particularly vulnerable due to their reliance on this software. While the vulnerability does not expose sensitive data or allow unauthorized code execution, the forced application crashes could lead to operational downtime and increased support costs. In tightly scheduled production environments, even short disruptions can have cascading effects on deliverables and client commitments. Additionally, repeated exploitation attempts could erode user confidence in the software’s stability. Given the user interaction requirement, social engineering or phishing campaigns could be used to trick users into opening malicious files, increasing the risk vector. The absence of a patch means organizations must rely on interim controls to mitigate risk until Adobe releases a fix.

Mitigation Recommendations

To mitigate CVE-2026-21301, European organizations should implement several specific measures beyond generic advice: 1) Enforce strict file handling policies by restricting the opening of files from untrusted or unknown sources within Substance3D - Modeler. 2) Educate users on the risks of opening files from unsolicited emails or downloads, emphasizing the need for caution with 3D model files. 3) Employ application whitelisting and sandboxing techniques to isolate Substance3D - Modeler processes, limiting the impact of crashes. 4) Monitor application logs and system stability metrics to detect abnormal crashes indicative of exploitation attempts. 5) Maintain up-to-date backups of critical project files to minimize disruption from unexpected application failures. 6) Engage with Adobe support channels to track patch releases and apply updates promptly once available. 7) Consider deploying endpoint detection and response (EDR) solutions capable of identifying suspicious file interactions related to this vulnerability. These targeted actions will reduce the likelihood and impact of exploitation while maintaining operational continuity.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
adobe
Date Reserved
2025-12-12T22:01:18.191Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6966bf90a60475309fb963e5

Added to database: 1/13/2026, 9:56:32 PM

Last enriched: 1/21/2026, 2:53:58 AM

Last updated: 2/7/2026, 2:28:32 AM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats