CVE-2024-9721

7.8 HIGH

📋 TL;DR

A use-after-free vulnerability in Trimble SketchUp Viewer's SKP file parsing allows remote attackers to execute arbitrary code when a user opens a malicious SKP file or visits a malicious webpage. This affects all users of vulnerable SketchUp Viewer installations. Successful exploitation gives attackers control over the victim's system within the context of the current process.

💻 Affected Systems

Products:
  • Trimble SketchUp Viewer
Versions: Specific versions not specified in advisory; likely multiple recent versions prior to patch
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations that process SKP files are vulnerable. User interaction required (opening malicious file).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via remote code execution leading to data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Malware installation, credential theft, or lateral movement within the network after user opens a malicious file.

🟢

If Mitigated

Limited to application crash or denial of service if exploit fails or security controls block execution.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction but no authentication. Weaponization likely given RCE nature and ZDI disclosure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Trimble security advisory for specific patched version

Vendor Advisory: https://www.trimble.com/security/advisories

Restart Required: Yes

Instructions:

1. Open SketchUp Viewer
2. Go to Help > Check for Updates
3. Install available updates
4. Restart application

🔧 Temporary Workarounds

Disable SKP file association

windows

Prevent automatic opening of SKP files with SketchUp Viewer

Windows: Control Panel > Default Programs > Associate a file type or protocol with a program > Change .skp association to Notepad or other safe viewer

Application whitelisting

windows

Block SketchUp Viewer execution via AppLocker or similar

🧯 If You Can't Patch

  • Implement network segmentation to isolate SketchUp Viewer systems
  • Use email/web filtering to block SKP attachments and downloads

🔍 How to Verify

Check if Vulnerable:

Check SketchUp Viewer version against Trimble's patched version list

Check Version:

Windows: Open SketchUp Viewer > Help > About SketchUp Viewer

Verify Fix Applied:

Confirm version is updated to patched release and test with known safe SKP files

📡 Detection & Monitoring

Log Indicators:

  • Application crashes of SketchUp Viewer
  • Unusual process spawning from SketchUp Viewer

Network Indicators:

  • Unexpected outbound connections from SketchUp Viewer process

SIEM Query:

Process creation where parent process contains 'sketchup' AND child process is suspicious (cmd.exe, powershell.exe, etc)

🔗 References

📤 Share & Export