Cyber Posture

CVE-2025-24441

High

Published: 11 March 2025

Published
11 March 2025
Modified
01 April 2025
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0003 8.6th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

An adversary may rely upon a user opening a malicious file in order to gain execution.

Security Summary

CVE-2025-24441 is an out-of-bounds write vulnerability (CWE-787) affecting Adobe Substance3D Sampler versions 4.5.2 and earlier. This flaw occurs during the processing of malicious files, potentially leading to arbitrary code execution in the context of the current user. The vulnerability received a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) and was published on March 11, 2025.

Exploitation requires local access and user interaction, as a victim must open a specially crafted malicious file. An attacker with no privileges can leverage this to achieve full compromise of the affected system, gaining high-impact confidentiality, integrity, and availability effects through code execution under the user's privileges. Common vectors include social engineering tactics like phishing emails or shared files that entice users to load the malicious content in Substance3D Sampler.

Adobe Security Bulletin APSB25-16, available at https://helpx.adobe.com/security/products/substance3d-sampler/apsb25-16.html, details mitigation steps, including recommendations to update to a patched version of Substance3D Sampler.

Details

CWE(s)
CWE-787

Affected Products

adobe
substance 3d sampler
≤ 5.0

MITRE ATT&CK Enterprise Techniques

T1204.002 Malicious File Execution
An adversary may rely upon a user opening a malicious file in order to gain execution.
Why these techniques?

The out-of-bounds write vulnerability enables arbitrary code execution when a user opens a specially crafted malicious file in the vulnerable application, directly mapping to T1204.002: Malicious File under User Execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References