CVE-2024-9713

7.8 HIGH

📋 TL;DR

A use-after-free vulnerability in Trimble SketchUp Pro's SKP file parser allows remote attackers to execute arbitrary code when a user opens a malicious SKP file or visits a malicious webpage. This affects users of SketchUp Pro who process untrusted SKP files. The vulnerability stems from improper object validation during file parsing.

💻 Affected Systems

Products:
  • Trimble SketchUp Pro
Versions: Specific affected versions not detailed in advisory, but likely multiple recent versions prior to patch
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All installations processing SKP files are vulnerable by default. User interaction required (opening malicious file).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the victim's machine, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation leading to installation of malware, data exfiltration, or persistence mechanisms on the affected system.

🟢

If Mitigated

Limited impact through application sandboxing or restricted user privileges, potentially resulting in application crash rather than code execution.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction but is weaponizable through social engineering. Use-after-free vulnerabilities are commonly exploited for RCE.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Trimble security advisory for specific patched version

Vendor Advisory: https://help.sketchup.com/en/release-notes

Restart Required: Yes

Instructions:

1. Open SketchUp Pro
2. Go to Help > Check for Updates
3. Install available updates
4. Restart SketchUp Pro

🔧 Temporary Workarounds

Disable SKP file association

all

Prevent automatic opening of SKP files by changing file associations

Windows: Control Panel > Default Programs > Associate a file type or protocol with a program
macOS: Right-click SKP file > Get Info > Open with > Change All

Application sandboxing

all

Run SketchUp Pro in restricted environment to limit exploit impact

Windows: Use Windows Sandbox or AppLocker
macOS: Use sandbox-exec or create restricted user account

🧯 If You Can't Patch

  • Implement application whitelisting to block SketchUp Pro execution
  • Use network segmentation to isolate SketchUp Pro systems from critical assets

🔍 How to Verify

Check if Vulnerable:

Check SketchUp Pro version against Trimble's security advisory for affected versions

Check Version:

Windows: Open SketchUp Pro > Help > About SketchUp Pro; macOS: SketchUp Pro > About SketchUp Pro

Verify Fix Applied:

Verify installed version matches or exceeds patched version from Trimble advisory

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with memory access violations
  • Unexpected child processes spawned from SketchUp Pro
  • Unusual network connections from SketchUp Pro process

Network Indicators:

  • Outbound connections to suspicious IPs following SKP file opening
  • DNS requests for known malicious domains from SketchUp process

SIEM Query:

process_name:"SketchUp.exe" AND (event_id:1000 OR parent_process:"SketchUp.exe")

🔗 References

📤 Share & Export