How to fix CVE-2024-3094 – Step-by-Step Guide
CVE-2024-3094, the XZ Utils Backdoor, is a critical supply chain vulnerability (CVSS 10) affecting XZ Utils versions 5.6.0 and 5.6.1. This sophisticated attack inserted malicious code, posing a severe threat to system integrity and trust in open-source software.
What is XZ Utils Backdoor – Supply Chain Attack?
A sophisticated supply chain attack inserted a backdoor into XZ Utils versions 5.6.0 and 5.6.1. This malicious code, disguised within liblzma, could allow an attacker to gain unauthorized remote SSH access. Specifically, it targets systems using systemd-linked sshd, exploiting the compromised library during authentication.
Impact and Risks for your Infrastructure
The primary impact is unauthorized remote access to affected systems running XZ Utils 5.6.0/5.6.1 with systemd-linked sshd. Attackers could execute arbitrary code, leading to full system compromise and data exfiltration. While critical, its discovery before widespread deployment limited potential real-world impact.
Step-by-Step Mitigation Guide
Immediately identify and downgrade XZ Utils to a known safe version like 5.4.6, or upgrade to 5.6.2+ if available. Verify your system is not running affected versions 5.6.0 or 5.6.1 of XZ Utils/liblzma. Reboot systems after applying the fix and monitor for unusual activity.
- 1Downgrade XZ Utils to 5.4.6 or upgrade to 5.6.2+ immediately.
- 2Verify installed version: xz --version
- 3Audit system for indicators of compromise (IoC): check sshd binary hash.
- 4Rotate all SSH keys on affected systems.
- 5Implement software supply chain checks (SBOM, Sigstore, Trivy).
- 6Review and harden your CI/CD pipeline dependency management.