A critical security vulnerability, designated as CVE-2024-3094, has been identified in the XZ Utils compression tools widely utilized across various Linux distributions in recent days. This vulnerability stems from malicious code embedded within versions 5.6.0 and 5.6.1 of the xz libraries, potentially permitting unauthorized remote access by bypassing sshd authentication mechanisms. This security flaw notably impacts Fedora 41 and Fedora Rawhide, among other distributions. Debian, openSUSE, and Kali Linux have also acknowledged potential exposure and have initiated steps towards mitigation.
Affected Systems
XZ Utils versions 5.6.0 and 5.6.1 are impacted.
IoC’s
-
Recommended Solution(s)
Users of the impacted distributions are advised to cease the use of compromised versions immediately. It is recommended to downgrade to a version of XZ Utils not affected by this vulnerability, such as version 5.4.6, to prevent potential security breaches.
Mitigations
Security Team Actions: Security teams should adhere to specific guidance provided for each Linux distribution. Following CISA's recommendation to downgrade to an uncompromised version of XZ Utils (e.g., version 5.4.6) and to search for any malicious or suspicious activity on systems where affected versions have been installed is crucial.
CVE / CWE
CVE-2024-3094
Related Website(s)
* Vulnerabilities with a CVSS 3.1 score between 7.0 and 8.9 are evaluated to be “high” whereas vulnerabilities with a CVSS 3.1 score between 9.0 and 10.0 are evaluated to be “critical”.
+90 216 504 53 32
Aydınevler Mahallesi,İsmet İnönü Cadddesi,Küçükyalı Ofis Park A Blok,No:20/1 Maltepe İstanbul
+90 312 235 44 51
You can register to our newsletter on the home page to be instantly informed about security vulnerabilities.