CVE-2024-9731

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious SKP files in Trimble SketchUp Viewer. Attackers can gain full control of the affected system through memory corruption during file parsing. All users of vulnerable SketchUp Viewer versions are affected.

💻 Affected Systems

Products:
  • Trimble SketchUp Viewer
Versions: Specific versions not detailed in advisory; assume all versions prior to patch
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default installation; user interaction required (opening malicious SKP file)

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control, data theft, lateral movement, and persistence establishment.

🟠

Likely Case

Malware installation, data exfiltration, or ransomware deployment through malicious SKP files shared via email or downloads.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions, potentially only application crash.

🌐 Internet-Facing: MEDIUM - Requires user interaction to open malicious files, but these can be distributed via web downloads or email attachments.
🏢 Internal Only: MEDIUM - Internal users could be targeted via phishing with malicious attachments or shared network drives.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user to open malicious file; memory corruption vulnerabilities in file parsers are commonly weaponized

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Trimble security advisory for specific patched version

Vendor Advisory: https://www.trimble.com/security/advisories

Restart Required: Yes

Instructions:

1. Check current SketchUp Viewer version
2. Visit Trimble security advisory page
3. Download and install latest patched version
4. Restart system after installation

🔧 Temporary Workarounds

Disable SKP file association

windows

Prevent SketchUp Viewer from automatically opening SKP files

Windows: Control Panel > Default Programs > Associate a file type or protocol with a program > Change .skp association to different program or none

Application sandboxing

all

Run SketchUp Viewer in restricted environment

🧯 If You Can't Patch

  • Implement application whitelisting to block SketchUp Viewer execution
  • Use email/web gateways to block SKP file attachments and downloads

🔍 How to Verify

Check if Vulnerable:

Check SketchUp Viewer version against Trimble's patched version list in security advisory

Check Version:

Windows: Open SketchUp Viewer > Help > About SketchUp Viewer

Verify Fix Applied:

Verify installed version matches or exceeds patched version from Trimble advisory

📡 Detection & Monitoring

Log Indicators:

  • Application crashes of SketchUp Viewer
  • Unusual process spawning from SketchUp Viewer
  • Multiple failed file parsing attempts

Network Indicators:

  • Downloads of SKP files from untrusted sources
  • Outbound connections from SketchUp Viewer process

SIEM Query:

Process creation where parent process contains 'sketchup' AND (command line contains suspicious patterns OR destination IP is malicious)

🔗 References

📤 Share & Export