CVE-2024-9729

7.8 HIGH

📋 TL;DR

This is a use-after-free vulnerability in Trimble SketchUp Viewer's SKP file parser that allows remote code execution. Attackers can exploit it by tricking users into opening malicious SKP files or visiting malicious web pages. Users of affected SketchUp Viewer versions are at risk.

💻 Affected Systems

Products:
  • Trimble SketchUp Viewer
Versions: Specific versions not detailed in advisory, but likely multiple recent versions prior to patch
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations with vulnerable versions are affected. User interaction required (opening malicious file).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the current user, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Local privilege escalation or malware installation on the victim's system, with potential data exfiltration.

🟢

If Mitigated

Limited impact due to sandboxing or restricted user privileges, possibly resulting in application crash only.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file). The vulnerability is in the file parsing logic, making reliable exploitation possible but requiring specific file crafting.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Trimble security advisory for specific patched version

Vendor Advisory: https://www.trimble.com/security/advisories

Restart Required: Yes

Instructions:

1. Open SketchUp Viewer
2. Go to Help > Check for Updates
3. Install available updates
4. Restart application

🔧 Temporary Workarounds

Disable SKP file association

all

Prevent SketchUp Viewer from automatically opening SKP files

Windows: Control Panel > Default Programs > Associate a file type or protocol with a program > Change .skp association to another program or none
macOS: Right-click SKP file > Get Info > Open With > Change to different application

Application sandboxing

all

Run SketchUp Viewer in restricted environment

Windows: Use Windows Sandbox or third-party sandboxing tools
macOS: Use built-in sandboxing features or third-party solutions

🧯 If You Can't Patch

  • Restrict user privileges to limit potential damage from exploitation
  • Implement application whitelisting to prevent unauthorized code execution

🔍 How to Verify

Check if Vulnerable:

Check SketchUp Viewer version against Trimble's security advisory for affected versions

Check Version:

Windows: Open SketchUp Viewer > Help > About SketchUp Viewer; macOS: Open SketchUp Viewer > SketchUp Viewer menu > About SketchUp Viewer

Verify Fix Applied:

Verify installed version is newer than vulnerable versions listed in advisory

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with memory access violations
  • Unexpected child processes spawned from SketchUp Viewer
  • Unusual file access patterns from SketchUp process

Network Indicators:

  • Unexpected outbound connections from SketchUp Viewer process
  • DNS requests to suspicious domains following SKP file opening

SIEM Query:

process_name:"SketchUp Viewer" AND (event_type:crash OR child_process_spawn:true)

🔗 References

📤 Share & Export