Microsoft 365’s Inclusion of SketchUp 3D Library Reveals Numerous Vulnerabilities

Microsoft’s inclusion of support for the SketchUp 3D Library in Microsoft 365 presents a noteworthy security concern for users. The integration of SketchUp into the cloud-based productivity and collaboration tools has been identified as a vulnerability. This article aims to delve into the disclosure of high-severity bugs, the bypassing of fixes, the impact on Microsoft 365 users, the discovery of multiple vulnerabilities, Microsoft’s assessment of severity, exploit scenarios, and provide background information on SketchUp.

Disclosure of High-Severity Bugs

Last December, researchers from Trend Micro’s Zero-Day Initiative (ZDI) revealed four high-severity remote code execution bugs in Microsoft 365. These bugs specifically affected the parsing of SketchUp files within the software suite. Microsoft promptly assigned three CVE (Common Vulnerabilities and Exposures) identifiers – CVE-2023-28285, CVE-2023-29344, and CVE-2023-33146 – and released patches to address these vulnerabilities in the May and June security updates.

Despite the patches, ThreatLabz researchers managed to develop a bypass for the fixes, prompting Microsoft to disable support for SketchUp in June of 2023. Initially described as a temporary measure, support for SketchUp remains disabled in Microsoft 365. This disabling emphasizes the severity of the vulnerabilities associated with SketchUp integration within the software suite.

Impact on Microsoft 365 Users

SketchUp is one of the most widely used formats available to Microsoft 365 users for inserting 3D files into applications such as Word, Excel, Outlook, and PowerPoint. Its popularity makes the vulnerabilities all the more concerning as it increases the potential attack surface for hackers aiming to exploit the weaknesses. Users must exercise caution when dealing with SketchUp files and consider alternative 3D file formats to mitigate the risks.

Discovery of Numerous Vulnerabilities

The Zscaler ThreatLabz researchers uncovered a staggering 117 vulnerabilities related to SketchUp when analyzing the dynamic link library responsible for parsing 3D file formats in Microsoft 365 apps. This discovery demonstrates the extent to which the integration of SketchUp has introduced potential avenues for attackers to exploit the software suite’s security.

Severity Assessment by Microsoft

After assessing the vulnerabilities, Microsoft classified them as being of important severity, which is marginally lower in terms of remediation priority than critical severity bugs. This classification emphasizes the significance of addressing these vulnerabilities promptly to ensure the overall security of Microsoft 365 and its users.

Exploit Scenarios and Precautions

Microsoft has described the vulnerabilities as issues that attackers can only exploit by tricking potential victims into running malicious files. This underscores the need for users to exercise caution when handling SketchUp files and to be vigilant against potential phishing attempts or other social engineering tactics that may lead to the execution of such files.

Background on SketchUp

SketchUp was first developed by @Last Software in 2000 and later transitioned to Google in 2006. It is now owned by Trimble Navigation. Over the years, SketchUp has become one of the most widely recognized and utilized 3D modeling tools available. Its versatility and ease of use have made it popular among professionals and amateur designers alike, contributing to its prominence in the 3D file format landscape.

The integration of SketchUp within Microsoft 365’s suite of cloud-based productivity and collaboration tools has unintentionally exposed users to numerous vulnerabilities. Despite patches released by Microsoft, the bypass discovered by ThreatLabz researchers forced the company to temporarily disable support for SketchUp. The discovery of 117 vulnerabilities highlights the potential risks associated with this integration. Microsoft’s classification of the vulnerabilities as being of high severity reinforces the need for users to remain vigilant and adopt additional security measures when handling SketchUp files. As Microsoft works to address these vulnerabilities, users must prioritize security to ensure the safety of their data and systems within the Microsoft 365 environment.

Explore more

Maryland Data Center Boom Sparks Local Backlash

A quiet 42-acre plot in a Maryland suburb, once home to a local inn, is now at the center of a digital revolution that residents never asked for, promising immense power but revealing very few secrets. This site in Woodlawn is ground zero for a debate raging across the state, pitting the promise of high-tech infrastructure against the concerns of

Trend Analysis: Next-Generation Cyber Threats

The close of 2025 brings into sharp focus a fundamental transformation in cyber security, where the primary battleground has decisively shifted from compromising networks to manipulating the very logic and identity that underpins our increasingly automated digital world. As sophisticated AI and autonomous systems have moved from experimental technology to mainstream deployment, the nature and scale of cyber risk have

Ransomware Attack Cripples Romanian Water Authority

An entire nation’s water supply became the target of a digital siege when cybercriminals turned a standard computer security feature into a sophisticated weapon against Romania’s essential infrastructure. The attack, disclosed on December 20, targeted the National Administration “Apele Române” (Romanian Waters), the agency responsible for managing the country’s water resources. This incident serves as a stark reminder of the

African Cybercrime Crackdown Leads to 574 Arrests

Introduction A sweeping month-long dragnet across 19 African nations has dismantled intricate cybercriminal networks, showcasing the formidable power of unified, cross-border law enforcement in the digital age. This landmark effort, known as “Operation Sentinel,” represents a significant step forward in the global fight against online financial crimes that exploit vulnerabilities in our increasingly connected world. This article serves to answer

Zero-Click Exploits Redefined Cybersecurity in 2025

With an extensive background in artificial intelligence and machine learning, Dominic Jainy has a unique vantage point on the evolving cyber threat landscape. His work offers critical insights into how the very technologies designed for convenience and efficiency are being turned into potent weapons. In this discussion, we explore the seismic shifts of 2025, a year defined by the industrialization