CVE-2026-27279
Published: 10 March 2026
Summary
CVE-2026-27279 is a high-severity Out-of-bounds Write (CWE-787) vulnerability in Adobe Substance 3D Stager. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 11.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mandates timely patching of the out-of-bounds write vulnerability in Substance3D Stager versions 3.1.7 and earlier to prevent arbitrary code execution.
Vulnerability scanning detects installations of vulnerable Substance3D Stager software, enabling prioritization and remediation of this specific CVE.
Memory protection safeguards such as DEP and ASLR prevent unauthorized code execution stemming from the out-of-bounds write in Substance3D Stager.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
OOB write in client app enables RCE via malicious file opened by user (T1204.002), directly mapping to client-side exploitation (T1203).
NVD Description
Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must…
more
open a malicious file.
Deeper analysisAI
CVE-2026-27279 is an out-of-bounds write vulnerability (CWE-787) affecting Adobe Substance3D Stager versions 3.1.7 and earlier. Published on 2026-03-10T19:17:20.080, the issue carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) and could result in arbitrary code execution in the context of the current user.
Exploitation requires local access with low complexity and no privileges, but user interaction is necessary as a victim must open a malicious file. An attacker could leverage this to achieve high confidentiality, integrity, and availability impacts within the user's session.
The Adobe Product Security Bulletin APSB26-29 at https://helpx.adobe.com/security/products/substance3d_stager/apsb26-29.html provides details on mitigation and patches.
Details
- CWE(s)