Skip to content

Uncovered: Backdoor found in XZ Utils SSH service

Vulnerability CVE-2024-3094 in XZ Utils SSHd potentially opens up Linux systems to threat, discover methods for identification and prevention alongside Qualys.

XZ Utils Secret SSH Access Point Discovered
XZ Utils Secret SSH Access Point Discovered

Uncovered: Backdoor found in XZ Utils SSH service

In a recent cybersecurity development, a backdoor vulnerability has been discovered in the XZ Utils software, a set of free command-line lossless data compressors for Unix-like operating systems. The affected versions are 5.6.0 and 5.6.1.

This malicious code, responsible for the backdoor build process, is facilitated by an M4 macro. It has been found that the M4 macro is responsible for the backdoor build process, and its post-detection leads to second-stage artifacts in the Git repository.

The vulnerability (CVE-2024-3094) exists in the source tarballs of XZ Utils, and if the liblzma library, a part of the software, is affected by malicious code, data from other applications that use the library may also be modified or intercepted.

The impact of this vulnerability is significant. It may interfere with authentication in sshd via systemd, potentially enabling unauthorized remote access to the entire system. Moreover, this vulnerability may allow remote access to targeted systems under certain conditions.

Several Linux distributions, including Ubuntu, Debian, Fedora, openSUSE, Alpine Linux, Arch Linux, and Gentoo, have confirmed being affected by the CVE-2024-3094 vulnerability. Red Hat, in response, has assigned the CVE and operated advisories related to it. As a precaution, GitHub repositories related to the affected software were disabled to contain the issue. However, LANCOM Systems confirmed that their hardware and software products are not affected by CVE-2024-3094.

For each Linux distribution, specific guidance is available at the respective links provided in the article. For instance, AWS users should refer to the security bulletin, while SOC and Incident Responders can refer to guidance provided by CISA for downgrading to an uncompromised XZ Utils version that is earlier than 5.6.0.

The Qualys Research team is building detections to help customers identify the risk posed by this vulnerability in their environment. Incident response processes should be invoked to hunt for suspicious activity on systems where affected versions of XZ Utils have been installed.

For more detailed information, users are encouraged to visit the links provided in the article. Stay vigilant and secure!

Read also:

Latest