<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Painter (&lt; 12.0.2) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/painter--12.0.2/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 12 May 2026 18:27:59 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/painter--12.0.2/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-34675: Adobe Substance3D Painter Out-of-Bounds Write Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-34675-substance3d/</link><pubDate>Tue, 12 May 2026 18:27:59 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-34675-substance3d/</guid><description>Adobe Substance3D Painter versions 12.0.2 and earlier are vulnerable to an out-of-bounds write vulnerability (CVE-2026-34675) that could lead to arbitrary code execution if a user opens a malicious file.</description><content:encoded><![CDATA[<p>Adobe Substance3D Painter versions 12.0.2 and earlier are susceptible to an out-of-bounds write vulnerability, identified as CVE-2026-34675. This vulnerability can be exploited if a user opens a specially crafted malicious file. Successful exploitation could allow an attacker to execute arbitrary code within the context of the current user, potentially leading to system compromise. The vulnerability requires user interaction, as the victim must open a malicious file for the exploit to be triggered. This issue poses a significant risk to organizations and individuals using the affected versions of Substance3D Painter, as it could lead to data breaches, malware infections, or complete system takeover.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious Substance3D Painter file.</li>
<li>The attacker delivers the malicious file to the victim. This could be achieved through various methods, such as email, file sharing platforms, or compromised websites.</li>
<li>The victim, unaware of the malicious nature of the file, opens it using a vulnerable version of Adobe Substance3D Painter (&lt;= 12.0.2).</li>
<li>The vulnerable software attempts to process the crafted file.</li>
<li>Due to the out-of-bounds write vulnerability (CVE-2026-34675), the software writes data to an unintended memory location.</li>
<li>The attacker-controlled data overwrites critical program data or code.</li>
<li>The attacker gains the ability to execute arbitrary code within the context of the user running Substance3D Painter.</li>
<li>The attacker can then perform actions such as installing malware, stealing sensitive data, or gaining persistent access to the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-34675 can lead to arbitrary code execution on the victim&rsquo;s machine, within the context of the user running the vulnerable application. This could allow an attacker to steal sensitive information, install malware, or gain persistent access to the system. Given the potential for arbitrary code execution, this vulnerability poses a significant risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to a patched version of Adobe Substance3D Painter greater than 12.0.2 to remediate CVE-2026-34675.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious File Opens in Substance3D Painter&rdquo; to identify attempts to exploit this vulnerability by monitoring file opening events.</li>
<li>Implement user awareness training to educate users about the risks of opening files from untrusted sources.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>out-of-bounds write</category><category>code execution</category></item></channel></rss>