How to fix CVE-2024-3094 – Step-by-Step Guide
CVE-2024-3094 details a critical supply chain attack involving XZ Utils versions 5.6.0 and 5.6.1. This vulnerability, rated CVSS 10.0, introduces a backdoor enabling unauthorized remote access.
What is XZ Utils Backdoor – Supply Chain Attack?
A sophisticated backdoor was maliciously inserted into XZ Utils versions 5.6.0 and 5.6.1. This backdoor, within the liblzma library, specifically targets systems using systemd-linked sshd. It allows a remote attacker to gain unauthorized SSH access to the compromised system.
Impact and Risks for your Infrastructure
The primary impact is unauthorized remote access to affected systems running XZ Utils 5.6.0/5.6.1 with systemd-linked sshd. This could lead to complete system compromise, data exfiltration, or further network penetration. While discovered early, the potential for severe infrastructure compromise was critical.
Step-by-Step Mitigation Guide
Immediately identify and downgrade XZ Utils to version 5.4.6 or upgrade to 5.6.2+. Verify your system's XZ Utils version using `xz --version` or by checking package manager logs. Ensure no affected versions (5.6.0, 5.6.1) remain active on any system.
- 1Downgrade XZ Utils to 5.4.6 or upgrade to 5.6.2+ immediately.
- 2Verify installed version: xz --version
- 3Audit system for indicators of compromise (IoC): check sshd binary hash.
- 4Rotate all SSH keys on affected systems.
- 5Implement software supply chain checks (SBOM, Sigstore, Trivy).
- 6Review and harden your CI/CD pipeline dependency management.