ICS: Multiple Siemens Products Vulnerabilities
November 22, 2024Oracle Alerts of Agile PLM Flaw Being Actively Exploited in Wild
November 22, 2024ICS: Multiple Siemens Products Vulnerabilities
November 22, 2024Oracle Alerts of Agile PLM Flaw Being Actively Exploited in Wild
November 22, 2024Severity
Medium
Analysis Summary
CVE-2024-47438 CVSS:5.5
Substance3D - Painter versions 10.1.0 and earlier are affected by a Write-what-where Condition vulnerability that could lead to a memory leak. This vulnerability allows an attacker to write a controlled value at a controlled memory location, which could result in the disclosure of sensitive memory content. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-47437 CVSS:5.5
Substance3D - Painter versions 10.1.0 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-47436 CVSS:5.5
Substance3D - Painter versions 10.1.0 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-47435 CVSS:5.5
Substance3D - Painter versions 10.1.0 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-47434 CVSS:7.8
Substance3D - Painter versions 10.1.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-47433 CVSS:7.8
Substance3D - Painter versions 10.1.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-47432 CVSS:7.8
Substance3D - Painter versions 10.1.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-47431 CVSS:7.8
Substance3D - Painter versions 10.1.0 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-47430 CVSS:7.8
Substance3D - Painter versions 10.1.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2024-47429 CVSS:7.8
Substance3D - Painter versions 10.1.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Impact
- Code Execution
- Security Bypass
- Information Disclosure
Indicators of Compromise
CVE
- CVE-2024-47438
- CVE-2024-47437
- CVE-2024-47436
- CVE-2024-47435
- CVE-2024-47434
- CVE-2024-47433
- CVE-2024-47432
- CVE-2024-47431
- CVE-2024-47430
- CVE-2024-47429
Affected Vendors
Affected Products
- Adobe Substance3D - Painter 10.1.0
Remediation
Refer to Adobe Security Advisory for patch, upgrade or suggested workaround information.