Malicious Code Discovered in xz Upstream Tarballs, Affecting liblzma and Other Dependent Packages

CVE-2024-3094
10CRITICAL

Key Information

Vendor
Red Hat
Status
Xz
Red Hat Enterprise Linux 6
Red Hat Enterprise Linux 7
Red Hat Enterprise Linux 8
Vendor
CVE Published:
29 March 2024

Badges

🔥 No. 1 Trending😄 Trended👾 Exploit Exists🔴 Public PoC📰 News Worthy

Summary

CVE-2024-3094 is a severe vulnerability found in the XZ Utils compression library, affecting major Linux distributions such as Fedora, Kali Linux, and openSUSE. The vulnerability allows for unauthorized remote access to systems and has been exploited by injecting code into the authentication process to enable access. Red Hat has issued an urgent security alert and advised users to downgrade to an uncompromised version of XZ Utils. Additionally, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has advised users to downgrade to an earlier version of XZ Utils to mitigate the risk. There are currently no reports of active exploitation in the wild, but the severity of the vulnerability underscores the importance of addressing it promptly.

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

EPSS Score

15% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
10
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • Risk change from: null to: 10 - (CRITICAL)

  • 👾

    Exploit exists.

  • 🔥

    Vulnerability reached the number 1 worldwide trending spot.

  • Vulnerability started trending.

  • First article discovered by Beeping Computers

  • Vulnerability Reserved.

  • Vulnerability published.

  • Reported to Red Hat.

Collectors

NVD DatabaseMitre Database4 Proof of Concept(s)21 News Article(s)

Credit

Red Hat would like to thank Andres Freund for reporting this issue.
.