How to fix CVE-2024-3094 – Step-by-Step Guide
CVE-2024-3094, known as the XZ Utils Backdoor, is a critical supply chain vulnerability (CVSS 10) affecting XZ Utils versions 5.6.0 and 5.6.1. This sophisticated attack involved a malicious backdoor inserted into the widely used data compression library.
What is XZ Utils Backdoor – Supply Chain Attack?
A malicious backdoor was covertly inserted into XZ Utils versions 5.6.0 and 5.6.1 via a compromised maintainer account. This backdoor, embedded within the liblzma component, specifically targets systems using systemd-linked sshd. It allows an attacker with a specific private key to gain unauthorized remote SSH access.
Impact and Risks for your Infrastructure
The primary impact is unauthorized remote access, potentially leading to full system compromise for affected infrastructure. While the backdoor was discovered before widespread deployment, any system running vulnerable XZ Utils versions with systemd-linked sshd is at critical risk of a breach.
Step-by-Step Mitigation Guide
Immediately downgrade XZ Utils to a known safe version like 5.4.6, or upgrade to 5.6.2+ if available and verified by your distribution. Verify the installed XZ Utils version is not 5.6.0 or 5.6.1. Monitor systems for any signs of compromise, especially SSH logs.
- 1Downgrade XZ Utils to 5.4.6 or upgrade to 5.6.2+ immediately.
- 2Verify installed version: xz --version
- 3Audit system for indicators of compromise (IoC): check sshd binary hash.
- 4Rotate all SSH keys on affected systems.
- 5Implement software supply chain checks (SBOM, Sigstore, Trivy).
- 6Review and harden your CI/CD pipeline dependency management.