First published: Wed Jan 10 2024(Updated: )
Adobe Substance 3D Stager versions 2.1.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Adobe Substance 3D Stager | <=2.1.3 | |
Any of | ||
Apple macOS | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20711 has been classified with a severity rating that indicates a significant risk due to potential sensitive memory disclosure.
To address CVE-2024-20711, update Adobe Substance 3D Stager to version 2.1.4 or later, where the vulnerability is resolved.
An attacker exploiting CVE-2024-20711 could potentially bypass security mitigations like ASLR and gain access to sensitive information.
Adobe Substance 3D Stager versions 2.1.3 and earlier are affected by CVE-2024-20711.
No, the fix for CVE-2024-20711 only requires updating Adobe Substance 3D Stager, as it does not directly involve operating system updates.