CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Description
Substance3D - Sampler versions 5.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Analysis
CVE-2025-43581 is an out-of-bounds write vulnerability in Adobe Substance3D - Sampler (versions 5.0 and earlier) that enables arbitrary code execution within the current user's security context. The vulnerability requires user interaction-specifically opening a malicious file-making it a file-based attack vector. With a CVSS score of 7.8 and high impact ratings for confidentiality, integrity, and availability, this represents a significant local privilege escalation risk for affected users, though exploitation requires social engineering or file delivery mechanisms.
Technical Context
Out-of-bounds write vulnerabilities (CWE-787) occur when software writes data to memory addresses outside the bounds of allocated buffers, corrupting adjacent memory structures and potentially enabling arbitrary code execution. In the context of Substance3D - Sampler, a 3D content creation and sampling tool by Adobe, this vulnerability likely manifests during the parsing or processing of malicious project files, texture files, or sampler configuration files. The affected CPE would be 'cpe:2.3:a:adobe:substance3d_sampler:*:*:*:*:*:*:*:*' with version constraint <=5.0. The vulnerability sits at the file parsing layer, where insufficient bounds checking on user-supplied data (from a malicious file) allows an attacker to overwrite critical heap or stack memory, redirect execution flow, or corrupt function pointers to achieve code execution.
Affected Products
Substance3D - Sampler (5.0 and earlier)
Remediation
Patching: Upgrade Substance3D - Sampler to version 5.1 or later when Adobe releases a patched version. Check Adobe Security Bulletins and the Substance3D product page for official patch releases.; priority: Critical Workaround: Until patching is available: (1) Restrict opening of Substance3D project files and sampler files to trusted sources only; (2) Disable Substance3D - Sampler if not actively in use; (3) Run Substance3D - Sampler in a sandboxed or isolated user account with minimal privilege elevation potential; (4) Implement file integrity monitoring on incoming Substance3D project files.; priority: High Detection: Monitor for suspicious file modifications or crashes in Substance3D - Sampler processes. Enable application whitelisting to prevent unauthorized code execution in the context of the application.; priority: Medium Monitoring: Subscribe to Adobe Security Bulletins (https://helpx.adobe.com/security.html) and Substance3D product advisories for patch availability and official remediation guidance.; priority: High
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-17719