CVE-2023-50196

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious SKP files in Trimble SketchUp Viewer. The flaw exists due to improper validation of object existence during SKP file parsing, leading to use-after-free conditions. All users running vulnerable versions of SketchUp Viewer are affected.

💻 Affected Systems

Products:
  • Trimble SketchUp Viewer
Versions: Versions prior to the patched release (specific version numbers not provided in CVE description)
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: User interaction required - victim must open malicious SKP file or visit malicious webpage that triggers file opening.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the current user, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation leading to malware installation, data exfiltration, or persistence mechanisms being established on the compromised system.

🟢

If Mitigated

Limited impact due to application sandboxing or restricted user privileges, potentially resulting in application crash without code execution.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction but the vulnerability is in a widely used file format parser, making weaponization likely. ZDI-CAN-21800 indicates coordinated vulnerability disclosure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Trimble security advisory for specific patched version

Vendor Advisory: https://www.trimble.com/security/advisories

Restart Required: Yes

Instructions:

1. Open SketchUp Viewer
2. Navigate to Help > Check for Updates
3. Install any available updates
4. Restart the application

🔧 Temporary Workarounds

Disable SKP file association

all

Prevent SketchUp Viewer from automatically opening SKP files

Windows: Control Panel > Default Programs > Associate a file type or protocol with a program > Change .skp association to another program or 'Ask every time'
macOS: Right-click SKP file > Get Info > Open with > Select different application

Application control policy

all

Block execution of SketchUp Viewer via application whitelisting

🧯 If You Can't Patch

  • Implement network segmentation to isolate systems running SketchUp Viewer
  • Use email/web filtering to block SKP file attachments and downloads

🔍 How to Verify

Check if Vulnerable:

Check SketchUp Viewer version against Trimble's security advisory for vulnerable versions

Check Version:

Windows: Open SketchUp Viewer > Help > About SketchUp Viewer; macOS: Open SketchUp Viewer > SketchUp Viewer menu > About SketchUp Viewer

Verify Fix Applied:

Verify installed version matches or exceeds the patched version listed in Trimble's advisory

📡 Detection & Monitoring

Log Indicators:

  • Application crashes of SketchUp Viewer
  • Unusual process creation from SketchUp Viewer
  • Multiple failed file parsing attempts

Network Indicators:

  • Downloads of SKP files from untrusted sources
  • Outbound connections from SketchUp Viewer process

SIEM Query:

process_name:"SketchUp Viewer" AND (event_type:crash OR parent_process:"SketchUp Viewer")

🔗 References

📤 Share & Export