How to fix CVE-2024-3094 – Step-by-Step Guide
CVE-2024-3094 (XZ Utils Backdoor – Supply Chain Attack) is a <strong>CRITICAL severity</strong> vulnerability with a CVSS score of 10/10. A malicious backdoor was inserted into XZ Utils 5.6.0 and 5.6.1 by a compromised maintainer, enabling unauthorized SSH access via systemd on affected systems. Follow the step-by-step guide below to remediate this vulnerability in your infrastructure.
What is XZ Utils Backdoor – Supply Chain Attack?
XZ Utils Backdoor – Supply Chain Attack (CVE-2024-3094) affects <strong>XZ Utils (liblzma)</strong>. A malicious backdoor was inserted into XZ Utils 5.6.0 and 5.6.1 by a compromised maintainer, enabling unauthorized SSH access via systemd on affected systems. It was published on 2024-03-29 and affects <strong>XZ Utils 5.6.0, 5.6.1</strong>. The fixed version is <strong>XZ Utils 5.4.6 (downgrade) or 5.6.2+</strong>.
Impact and Risks for your Infrastructure
Affected systems with XZ Utils 5.6.0/5.6.1 and systemd-linked sshd are vulnerable to unauthorized remote access. The backdoor was discovered before widespread deployment.
Step-by-Step Mitigation Guide
To remediate CVE-2024-3094, follow the prioritized mitigation steps: Downgrade XZ Utils to 5.4.6 or upgrade to 5.6.2+ immediately. → Verify installed version: xz --version → Audit system for indicators of compromise (IoC): check sshd binary hash. → Rotate all SSH keys on affected systems. → Implement software supply chain checks (SBOM, Sigstore, Trivy). → Review and harden your CI/CD pipeline dependency management.. Verify the fix using the verification commands below and confirm the patched version is deployed across all affected systems.
- 1Downgrade XZ Utils to 5.4.6 or upgrade to 5.6.2+ immediately.
- 2Verify installed version: xz --version
- 3Audit system for indicators of compromise (IoC): check sshd binary hash.
- 4Rotate all SSH keys on affected systems.
- 5Implement software supply chain checks (SBOM, Sigstore, Trivy).
- 6Review and harden your CI/CD pipeline dependency management.