How to fix CVE-2024-3094 – Step-by-Step Guide
CVE-2024-3094, known as the XZ Utils Backdoor, is a critical supply chain vulnerability. Versions 5.6.0 and 5.6.1 of XZ Utils contain malicious code. This high-severity issue could lead to unauthorized remote access.
What is XZ Utils Backdoor – Supply Chain Attack?
A sophisticated backdoor was maliciously inserted into XZ Utils versions 5.6.0 and 5.6.1 via a compromised maintainer. This hidden code within `liblzma` manipulates `systemd`-linked `sshd` processes. It allows an attacker with a specific key to gain unauthorized remote SSH access to the system. This represents a severe supply chain compromise.
Impact and Risks for your Infrastructure
Systems running affected XZ Utils versions with `systemd`-linked `sshd` are vulnerable to complete compromise. This could lead to unauthorized remote access, data exfiltration, or full system control. While critical, the backdoor was discovered early, limiting widespread exploitation.
Step-by-Step Mitigation Guide
Immediately identify and downgrade XZ Utils from versions 5.6.0 or 5.6.1 to a known safe version like 5.4.6. Alternatively, upgrade to 5.6.2 or newer if available from trusted sources. Verify the installed version using `xz --version` to confirm the fix.
- 1Downgrade XZ Utils to 5.4.6 or upgrade to 5.6.2+ immediately.
- 2Verify installed version: xz --version
- 3Audit system for indicators of compromise (IoC): check sshd binary hash.
- 4Rotate all SSH keys on affected systems.
- 5Implement software supply chain checks (SBOM, Sigstore, Trivy).
- 6Review and harden your CI/CD pipeline dependency management.