CVE-2023-50192

7.8 HIGH

📋 TL;DR

This is a use-after-free vulnerability in Trimble SketchUp Viewer's SKP file parser that allows remote attackers to execute arbitrary code. Attackers can exploit it by tricking users into opening malicious SKP files or visiting malicious web pages. All users running vulnerable versions of SketchUp Viewer are affected.

💻 Affected Systems

Products:
  • Trimble SketchUp Viewer
Versions: Versions prior to the patched release (specific version numbers not provided in advisory)
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: User interaction required - victim must open malicious SKP file or visit malicious webpage. All default installations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the current user, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Local privilege escalation leading to malware installation, data exfiltration, or persistence mechanisms being established on the compromised system.

🟢

If Mitigated

Limited impact due to sandboxing or restricted user privileges, potentially only causing application crashes or denial of service.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction but no authentication. The vulnerability is in a file parser which is commonly targeted by attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Trimble's security advisory for specific patched version

Vendor Advisory: https://help.sketchup.com/en/release-notes/sketchup-viewer

Restart Required: Yes

Instructions:

1. Open SketchUp Viewer
2. Go to Help > Check for Updates
3. Install any available updates
4. Restart the application

🔧 Temporary Workarounds

Disable SKP file association

all

Prevent SketchUp Viewer from automatically opening SKP files

Windows: Control Panel > Default Programs > Associate a file type or protocol with a program > Select .skp > Change program > Choose different application
macOS: Right-click SKP file > Get Info > Open with > Select different application > Change All

Application sandboxing

all

Run SketchUp Viewer in restricted environment

Windows: Use Windows Sandbox or third-party sandboxing tools
macOS: Use built-in sandboxing features or third-party solutions

🧯 If You Can't Patch

  • Implement application whitelisting to prevent unauthorized SketchUp Viewer execution
  • Use network segmentation to isolate systems running SketchUp Viewer from critical assets

🔍 How to Verify

Check if Vulnerable:

Check SketchUp Viewer version against Trimble's security advisory for vulnerable versions

Check Version:

Windows: Open SketchUp Viewer > Help > About SketchUp Viewer; macOS: Open SketchUp Viewer > SketchUp Viewer > About SketchUp Viewer

Verify Fix Applied:

Verify SketchUp Viewer has been updated to the latest version and test opening known safe SKP files

📡 Detection & Monitoring

Log Indicators:

  • Application crashes of SketchUp Viewer
  • Unexpected process creation from SketchUp Viewer
  • Network connections initiated by SketchUp Viewer

Network Indicators:

  • Downloads of SKP files from untrusted sources
  • Outbound connections from SketchUp Viewer to suspicious IPs

SIEM Query:

process_name:"SketchUp Viewer" AND (event_type:crash OR parent_process:unexpected)

🔗 References

📤 Share & Export