CVE-2026-21306
Out-of-Bounds Write in Substance3D Sampler Enables Code Execution
Publication date: 2026-01-13
Last updated on: 2026-01-13
Assigner: Adobe Systems Incorporated
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| adobe | substance3d_sampler | to 5.1.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an out-of-bounds write in Substance3D - Sampler versions 5.1.0 and earlier. It can allow an attacker to execute arbitrary code with the privileges of the current user. Exploiting this vulnerability requires the victim to open a malicious file, meaning user interaction is necessary.
How can this vulnerability impact me? :
If exploited, this vulnerability can lead to arbitrary code execution on your system with the permissions of the current user. This could allow attackers to perform unauthorized actions such as installing malware, stealing data, or disrupting system operations.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, avoid opening malicious files with Substance3D - Sampler versions 5.1.0 and earlier. Update to a version later than 5.1.0 if available, and ensure users are aware not to open untrusted files. Since exploitation requires user interaction, educating users and applying software updates are key mitigation steps.