How to fix CVE-2024-3094 – Step-by-Step Guide
CVE-2024-3094, a critical supply chain attack, impacts XZ Utils versions 5.6.0 and 5.6.1. This vulnerability, dubbed the XZ Utils Backdoor, carries a CVSS score of 10.0, demanding immediate attention due to potential system compromise.
What is XZ Utils Backdoor – Supply Chain Attack?
A sophisticated backdoor was maliciously inserted into XZ Utils (liblzma) versions 5.6.0 and 5.6.1. This backdoor specifically targets systems using systemd-linked sshd, allowing a threat actor to gain unauthorized remote access. The attack was a supply chain compromise by a malicious maintainer.
Impact and Risks for your Infrastructure
Exploitation of CVE-2024-3094 grants unauthorized remote access to affected systems running XZ Utils 5.6.0/5.6.1 with systemd-linked sshd. This critical vulnerability could lead to full system compromise. Fortunately, it was discovered before widespread deployment, limiting potential damage.
Step-by-Step Mitigation Guide
Immediately downgrade XZ Utils to version 5.4.6 or upgrade to 5.6.2 or later. Verify the fix by checking your XZ Utils version and confirming no suspicious activity on SSH logs. Ensure your package manager sources are trusted to prevent reintroduction.
- 1Downgrade XZ Utils to 5.4.6 or upgrade to 5.6.2+ immediately.
- 2Verify installed version: xz --version
- 3Audit system for indicators of compromise (IoC): check sshd binary hash.
- 4Rotate all SSH keys on affected systems.
- 5Implement software supply chain checks (SBOM, Sigstore, Trivy).
- 6Review and harden your CI/CD pipeline dependency management.