CVE-2024-9715

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable versions of Trimble SketchUp Viewer. Attackers can exploit this by tricking users into opening malicious SKP files or visiting malicious web pages. The vulnerability affects users who process untrusted SKP files with SketchUp Viewer.

💻 Affected Systems

Products:
  • Trimble SketchUp Viewer
Versions: Versions prior to the patched release (specific version numbers not provided in advisory)
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected SketchUp Viewer versions are vulnerable when processing SKP files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the affected system, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation leading to installation of malware, data exfiltration, or persistence mechanisms on the compromised system.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions, potentially resulting in application crash rather than full system compromise.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file). The use-after-free vulnerability in SKP parsing makes reliable exploitation feasible for skilled attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Trimble security advisory for specific patched version

Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-24-1376/

Restart Required: Yes

Instructions:

1. Open Trimble SketchUp Viewer
2. Navigate to Help > Check for Updates
3. Install the latest available update
4. Restart the application

🔧 Temporary Workarounds

Disable SKP file association

all

Prevent SketchUp Viewer from automatically opening SKP files

Windows: Control Panel > Default Programs > Associate a file type or protocol with a program > Change .skp association to another program or 'Ask every time'
macOS: Right-click SKP file > Get Info > Open with > Select different application

Application sandboxing

all

Run SketchUp Viewer in restricted environment

Windows: Use Windows Sandbox or third-party sandboxing tools
macOS: Use built-in sandboxing features or third-party solutions

🧯 If You Can't Patch

  • Implement strict file handling policies to block SKP files from untrusted sources
  • Run SketchUp Viewer with minimal user privileges and in isolated environments

🔍 How to Verify

Check if Vulnerable:

Check SketchUp Viewer version against Trimble's security advisory for affected versions

Check Version:

Windows: Open SketchUp Viewer > Help > About SketchUp Viewer; macOS: Open SketchUp Viewer > SketchUp Viewer menu > About SketchUp Viewer

Verify Fix Applied:

Verify installed version is newer than the vulnerable version specified in Trimble's advisory

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with memory access violations
  • Unexpected child processes spawned from SketchUp Viewer
  • Unusual network connections from SketchUp Viewer process

Network Indicators:

  • Outbound connections to suspicious IPs following SKP file processing
  • DNS requests for known malicious domains from SketchUp process

SIEM Query:

process_name:"SketchUp Viewer" AND (event_type:crash OR child_process_spawn:true)

🔗 References

📤 Share & Export