CVE-2024-9713
📋 TL;DR
A use-after-free vulnerability in Trimble SketchUp Pro's SKP file parser allows remote attackers to execute arbitrary code when a user opens a malicious SKP file or visits a malicious webpage. This affects users of SketchUp Pro who process untrusted SKP files. The vulnerability stems from improper object validation during file parsing.
💻 Affected Systems
- Trimble SketchUp Pro
📦 What is this software?
Sketchup by Trimble
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with attacker gaining full control of the victim's machine, potentially leading to data theft, ransomware deployment, or lateral movement within the network.
Likely Case
Local privilege escalation leading to installation of malware, data exfiltration, or persistence mechanisms on the affected system.
If Mitigated
Limited impact through application sandboxing or restricted user privileges, potentially resulting in application crash rather than code execution.
🎯 Exploit Status
Exploitation requires user interaction but is weaponizable through social engineering. Use-after-free vulnerabilities are commonly exploited for RCE.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Trimble security advisory for specific patched version
Vendor Advisory: https://help.sketchup.com/en/release-notes
Restart Required: Yes
Instructions:
1. Open SketchUp Pro
2. Go to Help > Check for Updates
3. Install available updates
4. Restart SketchUp Pro
🔧 Temporary Workarounds
Disable SKP file association
allPrevent automatic opening of SKP files by changing file associations
Windows: Control Panel > Default Programs > Associate a file type or protocol with a program
macOS: Right-click SKP file > Get Info > Open with > Change All
Application sandboxing
allRun SketchUp Pro in restricted environment to limit exploit impact
Windows: Use Windows Sandbox or AppLocker
macOS: Use sandbox-exec or create restricted user account
🧯 If You Can't Patch
- Implement application whitelisting to block SketchUp Pro execution
- Use network segmentation to isolate SketchUp Pro systems from critical assets
🔍 How to Verify
Check if Vulnerable:
Check SketchUp Pro version against Trimble's security advisory for affected versions
Check Version:
Windows: Open SketchUp Pro > Help > About SketchUp Pro; macOS: SketchUp Pro > About SketchUp Pro
Verify Fix Applied:
Verify installed version matches or exceeds patched version from Trimble advisory
📡 Detection & Monitoring
Log Indicators:
- Application crashes with memory access violations
- Unexpected child processes spawned from SketchUp Pro
- Unusual network connections from SketchUp Pro process
Network Indicators:
- Outbound connections to suspicious IPs following SKP file opening
- DNS requests for known malicious domains from SketchUp process
SIEM Query:
process_name:"SketchUp.exe" AND (event_id:1000 OR parent_process:"SketchUp.exe")