CVE-2023-50188

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on affected Trimble SketchUp Viewer installations by tricking users into opening malicious SKP files. The flaw exists due to uninitialized memory access during SKP file parsing, enabling code execution in the current process context. Users of vulnerable SketchUp Viewer versions are affected.

💻 Affected Systems

Products:
  • Trimble SketchUp Viewer
Versions: Specific versions not detailed in provided references; likely multiple recent versions prior to patch
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations that process SKP files are vulnerable. User interaction required (opening malicious file).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via remote code execution, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation or malware installation when users open malicious SKP files from untrusted sources.

🟢

If Mitigated

Limited impact if proper application whitelisting and user training prevent execution of untrusted files.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction but no authentication. Weaponization likely due to file-based attack vector.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in provided references; check Trimble security advisory

Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-23-1838/

Restart Required: Yes

Instructions:

1. Check Trimble security advisory for latest patched version
2. Download and install latest SketchUp Viewer update
3. Restart system after installation

🔧 Temporary Workarounds

Disable SKP file association

all

Prevent SketchUp Viewer from automatically opening SKP files

Windows: Control Panel > Default Programs > Associate a file type or protocol
macOS: Right-click SKP file > Get Info > Change Open With

Application control policy

all

Block SketchUp Viewer execution via application whitelisting

Windows: Use AppLocker or Windows Defender Application Control
macOS: Use Gatekeeper or MDM policies

🧯 If You Can't Patch

  • Implement network segmentation to isolate SketchUp Viewer systems
  • Educate users to never open SKP files from untrusted sources

🔍 How to Verify

Check if Vulnerable:

Check SketchUp Viewer version against Trimble's patched version list

Check Version:

Windows: Check Help > About in SketchUp Viewer; macOS: Click SketchUp Viewer > About SketchUp Viewer

Verify Fix Applied:

Verify installed version matches or exceeds patched version from Trimble advisory

📡 Detection & Monitoring

Log Indicators:

  • Unexpected SketchUp Viewer crashes
  • Process creation from SketchUp Viewer with unusual parameters

Network Indicators:

  • Downloads of SKP files from untrusted sources
  • Outbound connections from SketchUp Viewer process

SIEM Query:

Process creation where parent_process contains 'sketchup' AND (command_line contains '.skp' OR image_path contains unusual locations)

🔗 References

📤 Share & Export