CVE-2024-9725

7.8 HIGH

📋 TL;DR

This is a use-after-free vulnerability in Trimble SketchUp Viewer's SKP file parser that allows remote attackers to execute arbitrary code. Attackers can exploit it by tricking users into opening malicious SKP files or visiting malicious web pages. Users of affected SketchUp Viewer versions are at risk.

💻 Affected Systems

Products:
  • Trimble SketchUp Viewer
Versions: Specific affected versions not detailed in advisory, but likely multiple recent versions prior to patch
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations with vulnerable versions are affected. User interaction required (opening malicious file).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the current user, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Local privilege escalation leading to malware installation, data exfiltration, or persistence mechanisms being established on the compromised system.

🟢

If Mitigated

Limited impact due to sandboxing, application whitelisting, or restricted user privileges preventing full system compromise.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file). The vulnerability is in ZDI's disclosure program (ZDI-CAN-24109).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Trimble security advisory for specific patched version

Vendor Advisory: https://www.trimble.com/security/advisories

Restart Required: Yes

Instructions:

1. Open SketchUp Viewer
2. Go to Help > Check for Updates
3. Install available updates
4. Restart application

🔧 Temporary Workarounds

Disable SKP file association

windows

Prevent SketchUp Viewer from automatically opening SKP files

Windows: Control Panel > Default Programs > Associate a file type or protocol with a program > Change .skp association to another program or none

User awareness training

all

Train users not to open SKP files from untrusted sources

🧯 If You Can't Patch

  • Implement application whitelisting to block SketchUp Viewer execution
  • Use sandboxing solutions to isolate SketchUp Viewer

🔍 How to Verify

Check if Vulnerable:

Check SketchUp Viewer version against Trimble's security advisory

Check Version:

Windows: Open SketchUp Viewer > Help > About SketchUp Viewer

Verify Fix Applied:

Verify version is updated to patched version listed in Trimble advisory

📡 Detection & Monitoring

Log Indicators:

  • Unexpected SketchUp Viewer crashes
  • Process creation from SketchUp Viewer with unusual parameters

Network Indicators:

  • Outbound connections from SketchUp Viewer to unknown IPs
  • DNS requests for suspicious domains after file open

SIEM Query:

Process creation where parent process is SketchUp Viewer AND (command line contains unusual parameters OR destination IP is suspicious)

🔗 References

📤 Share & Export