How to fix CVE-2024-3094 – Step-by-Step Guide
CVE-2024-3094, known as the XZ Utils Backdoor, is a critical supply chain attack (CVSS 10.0). It involves malicious code inserted into XZ Utils versions 5.6.0 and 5.6.1. This vulnerability poses a severe risk to affected Linux systems.
What is XZ Utils Backdoor – Supply Chain Attack?
A sophisticated supply chain attack involved a compromised maintainer inserting a backdoor into XZ Utils (liblzma) versions 5.6.0 and 5.6.1. This malicious code enabled unauthorized remote SSH access. It specifically targeted systems using systemd-linked sshd, allowing authentication bypass. This covert operation was discovered before widespread deployment.
Impact and Risks for your Infrastructure
Systems running XZ Utils 5.6.0 or 5.6.1 with systemd-linked sshd are vulnerable to unauthorized remote access. This could lead to complete system compromise and data exfiltration. Fortunately, the backdoor was discovered early, limiting its real-world impact.
Step-by-Step Mitigation Guide
Immediately downgrade XZ Utils to version 5.4.6 or upgrade to 5.6.2 or newer. Verify the installed version is not 5.6.0 or 5.6.1. Check for any signs of compromise, especially unauthorized SSH activity, after remediation.
- 1Downgrade XZ Utils to 5.4.6 or upgrade to 5.6.2+ immediately.
- 2Verify installed version: xz --version
- 3Audit system for indicators of compromise (IoC): check sshd binary hash.
- 4Rotate all SSH keys on affected systems.
- 5Implement software supply chain checks (SBOM, Sigstore, Trivy).
- 6Review and harden your CI/CD pipeline dependency management.