CVE Alert: CVE-2025-54245 – Adobe – Substance3D – Viewer

CVE-2025-54245

HIGHNo exploitation known

Substance3D – Viewer versions 0.25.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVSS v3.1 (7.8)
AV LOCAL · AC LOW · PR NONE · UI REQUIRED · S UNCHANGED
Vendor
Adobe
Product
Substance3D – Viewer
Versions
0 lte 0.25.1
CWE
CWE-787, Out-of-bounds Write (CWE-787)
Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Published
2025-09-09T21:10:25.377Z
Updated
2025-09-10T03:56:18.179Z

AI Summary Analysis

Risk verdict

High risk: possible arbitrary code execution in the user’s context if a malicious file is opened; treat as urgent for remediation once a patch is released.

Why this matters

The flaw enables full control of the victim’s session upon user interaction, potentially compromising data integrity and confidentiality. In enterprise creative environments, an attacker could weaponise this to install payloads, exfiltrate assets, or pivot to connected workstations or networks through subsequent moves.

Most likely attack path

An attacker delivers a crafted file and relies on social engineering to persuade the user to open it. No privileges are required beyond the user account, but the user must interact with the file (local vector, UI: required). If opened, the out-of-bounds write could allow code execution within the current process, enabling persistence or broader host compromise.

Who is most exposed

Creative teams and studios using desktop workstations for 3D asset workflows (Windows/macOS) are most at risk, especially where files from external sources are routinely opened in this viewer.

Detection ideas

  • Unexpected viewer process activity immediately after opening files from untrusted sources.
  • Unusual memory crashes or crash dumps tied to file load events.
  • Elevated process memory usage or anomalous heap-related errors in the viewer.
  • Creation of temp or log artefacts following receipt/opening of suspicious files.
  • EDR alerts for anomalous code execution paths initiated by the viewer.

Mitigation and prioritisation

  • Apply vendor patch to the latest available version promptly; test in a controlled environment first.
  • Implement application control and allowlisting for the viewer; block untrusted file types or sources.
  • Enforce user awareness: restrict opening files from unknown origins; use sandboxing for file previews.
  • Enhance monitoring: deploy endpoint detection for memory-corruption indicators and process launches from file-load events.
  • Change-management note: communicate remediation timelines to affected teams and temporarily suspend external file delivery channels if feasible.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.