Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27218: NULL Pointer Dereference (CWE-476) in Adobe Substance3D - Painter

0
Medium
VulnerabilityCVE-2026-27218cvecve-2026-27218cwe-476
Published: Tue Mar 10 2026 (03/10/2026, 18:47:42 UTC)
Source: CVE Database V5
Vendor/Project: Adobe
Product: Substance3D - Painter

Description

CVE-2026-27218 is a NULL Pointer Dereference vulnerability in Adobe Substance3D - Painter versions 11. 1. 2 and earlier. This flaw can be exploited by an attacker to cause the application to crash, resulting in a denial-of-service condition. Exploitation requires user interaction, specifically opening a maliciously crafted file. The vulnerability impacts application availability but does not affect confidentiality or integrity. The CVSS score is 5. 5 (medium severity), reflecting the limited scope and requirement for user action. No known exploits are currently in the wild, and no patches have been published yet. Organizations using Substance3D - Painter should be cautious when handling files from untrusted sources.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/17/2026, 19:27:36 UTC

Technical Analysis

CVE-2026-27218 is a vulnerability identified in Adobe Substance3D - Painter, a widely used 3D texturing and painting software. The issue is a NULL Pointer Dereference (CWE-476), which occurs when the application attempts to access or dereference a pointer that has not been properly initialized or has been set to NULL. This leads to an application crash, causing a denial-of-service (DoS) condition. The vulnerability affects versions 11.1.2 and earlier. Exploitation requires the victim to open a specially crafted malicious file, which triggers the NULL pointer dereference. The CVSS v3.1 base score is 5.5, indicating medium severity. The attack vector is local (AV:L), meaning the attacker must have local access or the victim must perform an action (UI:R) such as opening a file. No privileges are required (PR:N), and the impact is limited to availability (A:H), with no confidentiality or integrity impact. There are no known exploits in the wild, and no patches have been released at the time of this report. This vulnerability can disrupt workflows by crashing the application, potentially causing loss of unsaved work and interrupting creative processes.

Potential Impact

The primary impact of CVE-2026-27218 is denial of service through application crashes, which can disrupt creative workflows for individuals and organizations relying on Adobe Substance3D - Painter. This can lead to productivity loss, potential data loss if work is unsaved, and interruptions in project timelines. Since the vulnerability requires user interaction and does not allow for code execution or data compromise, the risk to confidentiality and integrity is minimal. However, in environments where Substance3D - Painter is critical for production pipelines, repeated crashes could have significant operational impact. The lack of known exploits reduces immediate risk, but the potential for targeted attacks exploiting this vulnerability remains. Organizations with large creative teams or those working with untrusted external files are at higher risk of encountering this issue.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement strict file handling policies, ensuring that only trusted and verified files are opened in Substance3D - Painter. Educate users to avoid opening files from untrusted or unknown sources. Maintain regular backups of work to minimize data loss from unexpected crashes. Monitor application stability and logs for frequent crashes that may indicate exploitation attempts. Since no patches are currently available, consider isolating or sandboxing the application environment to limit impact. Stay informed on Adobe security advisories for updates or patches addressing this vulnerability and apply them promptly once released. Additionally, consider using endpoint protection solutions that can detect anomalous application behavior indicative of exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
adobe
Date Reserved
2026-02-18T22:02:41.380Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b06a2a2f860ef943991ebc

Added to database: 3/10/2026, 6:59:54 PM

Last enriched: 3/17/2026, 7:27:36 PM

Last updated: 4/28/2026, 7:21:15 AM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses