CVE-2025-21168
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-08

Last updated on: 2025-07-11

Assigner: Adobe Systems Incorporated

Description
Substance3D - Designer versions 14.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-08
Last Modified
2025-07-11
Generated
2026-05-07
AI Q&A
2025-07-08
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
adobe substance_3d_designer to 14.1.1 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-125 The product reads data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an out-of-bounds read in Substance3D - Designer versions 14.1 and earlier. It allows an attacker to read memory outside the intended boundaries, potentially disclosing sensitive information. Exploiting this requires the victim to open a malicious file, and it can bypass security mitigations like ASLR.


How can this vulnerability impact me? :

The vulnerability can lead to disclosure of sensitive memory, which may expose confidential information. Since it bypasses mitigations such as ASLR, it increases the risk of further exploitation. However, exploitation requires user interaction by opening a malicious file.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, avoid opening malicious files in Substance3D - Designer versions 14.1 and earlier. Consider updating to a later version if available, and educate users about the risk of opening untrusted files. Employ general security best practices such as enabling ASLR and other system mitigations, although this vulnerability can bypass ASLR. Since exploitation requires user interaction, user awareness is critical.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart