CVE-2023-50190

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious SKP files in Trimble SketchUp Viewer. The flaw exists in SKP file parsing where improper data validation enables buffer overflow attacks. All users of affected SketchUp Viewer versions are at risk.

💻 Affected Systems

Products:
  • Trimble SketchUp Viewer
Versions: Versions prior to the patched release (specific version numbers not provided in available references)
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. User interaction required (opening malicious SKP file).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the victim's computer, data theft, ransomware deployment, and lateral movement within networks.

🟠

Likely Case

Malware installation, data exfiltration, and persistence establishment on individual workstations, potentially leading to broader network compromise.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions, potentially resulting in application crash rather than full system compromise.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user to open malicious file but no authentication needed. Weaponization likely given the nature of file format vulnerabilities.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Latest version from Trimble (specific version not specified in references)

Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-23-1840/

Restart Required: Yes

Instructions:

1. Open Trimble SketchUp Viewer
2. Navigate to Help > Check for Updates
3. Follow prompts to install latest version
4. Restart application after installation

🔧 Temporary Workarounds

Disable SKP file association

windows

Prevent SketchUp Viewer from automatically opening SKP files

Windows: Control Panel > Default Programs > Associate a file type or protocol with a program > Select .skp > Change program > Choose different application

Application sandboxing

all

Run SketchUp Viewer in restricted environment

🧯 If You Can't Patch

  • Implement application whitelisting to block SketchUp Viewer execution
  • Use network segmentation to isolate systems running vulnerable software

🔍 How to Verify

Check if Vulnerable:

Check SketchUp Viewer version against latest release from Trimble official website

Check Version:

Windows: Open SketchUp Viewer > Help > About SketchUp Viewer

Verify Fix Applied:

Verify version number matches or exceeds patched version from vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with memory access violations
  • Unexpected child processes spawned from SketchUp Viewer
  • Unusual network connections from SketchUp Viewer process

Network Indicators:

  • Outbound connections to suspicious IPs after opening SKP files
  • DNS requests for known malicious domains from affected systems

SIEM Query:

process_name:"SketchUp Viewer" AND (event_id:1000 OR event_id:1001) OR process_parent:"SketchUp Viewer" AND process_name NOT IN (expected_child_processes)

🔗 References

📤 Share & Export