#cve_2024_3094

2024-04-22

Elaastic on CVE-2024-3094 πŸ”— discuss.elastic.co/t/elastic-s

On March 29th, 2024, Elastic became aware of the malicious code planted in the xz package. Elastic has performed an investigation to identify any Elastic Products which may be impacted by this issue and we have concluded that no Elastic products use the versions of xz affected by this vulnerability. Therefore, Elastic Products are not affected by this issue.

#CVE_2024_3094 #xz #xzbackdoor #supplychainattack

2024-04-12

Kaspersky provides a timeline of events leading to the discovery of the backdoor in XZ Utils data compression library which is included in Linux distributions. They offer an analysis of Stage 1 (the modified build-to-host script), Stage 2 (injected shell script) and Stage 3 (backdoor extraction). Kaspersky also provides backdoor code analysis and explanation of system checks and structure. IOC and Yara rules provided. πŸ”— securelist.com/xz-backdoor-sto

cc: @shellsharks

#CVE_2024_3094 #xz #xzbackdoor #supplychainattack

2024-04-11

Phylum warns that the distribution v0.3.2 for liblzma hosted on crates.io contained test files for XZ which contain the backdoor. While affected versions of the liblzma and liblzma-sys crates were yanked from crates.io, the crates were downloaded over 5,000 times.πŸ”— blog.phylum.io/rust-crate-ship cc: @shellsharks

#xz #XZbackdoor #cve_2024_3094 #supplychainattack

2024-04-10

SentinelOne has a technical breakdown of the XZ backdoor: Initial setup, stage 1 payload (system checks and extraction) and stage 2 payload (injecting the backdoor). They provide an analysis of the attack execution, and briefly touch on attribution. IOC are included. πŸ”— sentinelone.com/blog/xz-utils-

#xz #CVE_2024_3094 #supplychainattack #xzbackdoor #thratintel #IOC

2024-04-08

Uptycs posts a comprehensive guide on the XZ Utils vulnerability CVE-2024-3094. This is the first guide I've seen with SHA256 hashes. πŸ”— uptycs.com/blog/xz-utils-backd

#xz #cve_2024_3094 #supplychainattack

2024-04-04

reflections on distrusting xz

"Was the ssh backdoor the only goal that "Jia Tan" was pursuing with their multi-year operation against xz?

I doubt it, and if not, then every fix so far has been incomplete, because everything is still running code written by that entity."
joeyh.name/blog/entry/reflecti
#xz #XzBackdoor #xzorcist #cve_2024_3094

2024-04-03

New York Times: "Did One Guy Just Stop a Huge Cyberattack?" See how a Microsoft engineer gained instant stardom using this one weird trick! (only because ssh was running 500ms slower) πŸ”— nytimes.com/2024/04/03/technol
Congratulations on your newfound fame (and thank you, sincerely) @AndresFreundTec

#xz #CVE_2024_3094 #supplychainattack

2024-04-02

The CEO of Phylum talks about the background of the XZ compromise and backdoor, and the challenges of open source software supply chain security. πŸ”— blog.phylum.io/xz-liblzma-back

#cve_2024_3094 #xz #supplychainattack

Taggart :donor:mttaggart@infosec.town
2024-04-02

One thing I haven't seen stated explicitly about #CVE_2024_3094: The engineer who found this is a Microsoft employee. Does that mean Microsoft runs the vulnerable configuration? Given that it isn't that common, could we reasonably deduce that Microsoft was a target?

Update: No; I'm just slow.

I misunderstood the nature of the systemd-ssh injection, which would have impacted any distro using systemd and sshd.

2024-04-02

Microsoft tech community has a Frequently Asked Questions and guidance for the XZ Utils backdoor (CVE-2024-3094). They provide guidance on using Microsoft products to assess exposure to CVE_2024-3094, e.g. Microsoft Defender Vulnerability Management, and Defender for Cloud and advanced hunting queries.πŸ”— techcommunity.microsoft.com/t5

#CVE_2024_3094 #xz #supplychainattack

2024-04-02

Akamai also has a resource guide for xz and CVE-2024-3094. Mitigation actions would be to downgrade to an uncompromised version, such as XZ Utils 5.4.6 Stable. Detection queries are provided. πŸ”— akamai.com/blog/security-resea

#CVE_2024_3094 #xz #supplychainattack

2024-04-02

Regarding xz and CVE-2024-3094, Tenable has a list of affected Linux distributions updated 01 April 2024: πŸ”— tenable.com/blog/frequently-as

  • Fedora Rawhide
  • Fedora 40 Beta (All Fedora 40 beta users are encouraged to revert to 5.4.x versions of XZ.)
  • Fedora 41
  • Debian testing, unstable and experimental distributions versions 5.5.1alpha-0.1 to 5.6.1-1
  • openSUSE Tumbleweed and openSUSE MicroOS (between March 7 and March 28)
  • Kali Linux (between March 26 and March 28)
  • Arch Linux
    • installation medium 2024.03.01
    • virtual machine images 20240301.218094 and 20240315.221711
    • container images created between and including 2024-02-24 and 2024-03-28

#CVE_2024_3094 #xz #Linux #supplychainattack

2024-04-02

Zscaler security alert on CVE-2024-3094 was more comprehensive than I expected. They provide background information on xz, affected versions, technical details, and recommendations/detection: πŸ”— zscaler.com/blogs/security-res

#cve_2024_3094 #xz #supplychainattack

2024-04-01

Palo Alto Networks has determined that none of their products are affected by CVE-2024-3094 (10.0 critical, disclosed 29 March 2024 as malicious code in xz utils). πŸ”— security.paloaltonetworks.com/

#CVE_2024_3094 #xz #supplychainattack

2024-04-01

Aqua includes their own security alert on CVE-2024-3094: Newly Discovered Backdoor in XZ tools. They also link the timeline provided by Evan Boehs. πŸ”— aquasec.com/blog/cve-2024-3094

#CVE_2024_3094 #xz #supplychainattack

2024-04-01

@bojanz of SANS ISC highlights portions of the xz backdoor: strings are all obfuscated, anti-debugging checks, and collection of valid usernames and IP addresses. πŸ”— isc.sans.edu/diary/rss/30802

#cve_2024_3094 #xz #supplychainattack #threatintel

2024-04-01

Rapid7 provides a security alert on Backdoored XZ Utils (CVE-2024-3094), identifying which distributions are affected and which are not. πŸ”— rapid7.com/blog/post/2024/04/0

#CVE_2024_3094 #xz #supplychainattack

:mastodon: deciodecio@infosec.exchange
2024-04-01

Joli! rΓ©tro-ingΓ©nierie du backdoor dans libxzma par @amlw πŸ™
Remplacement de la clΓ© de chiffrement et dΓ©mo de fonctionnement.

Bonus: Honeypot πŸ”₯
πŸ‘‡
github.com/amlweems/xzbot

#CVE_2024_3094

Taggart :donor:mttaggart@infosec.town
2024-04-01

Here's an exploit demo (yes, really) for the xz backdoor:

github.com/amlweems/xzbot

#CVE_2024_3094

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst