{"id":24228,"date":"2024-04-15T08:27:38","date_gmt":"2024-04-15T16:27:38","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2024\/04\/15\/news-17958\/"},"modified":"2024-04-15T08:27:38","modified_gmt":"2024-04-15T16:27:38","slug":"news-17958","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2024\/04\/15\/news-17958\/","title":{"rendered":"CVE-2024-3094: malicious code in Linux distributions | Kaspersky official blog"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2024\/03\/31152754\/CVE-2024-3094-vulnerability-backdoor-featured.jpg\"\/><\/p>\n<p><strong>Credit to Author: Editorial Team| Date: Sun, 31 Mar 2024 19:40:31 +0000<\/strong><\/p>\n<p>Unknown actors have implanted malicious code into versions 5.6.0 and 5.6.1 of the open source compression tools set XZ Utils. To make matters worse, trojanized utilities have managed to find their way into several popular builds of Linux released this March, so this incident could be regarded as a supply-chain attack. This vulnerability has been assigned <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-3094\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2024-3094<\/a>.<\/p>\n<h2>What makes this malicious implant so dangerous?<\/h2>\n<p>Initially, various researchers claimed that this backdoor allowed attackers to bypass <a href=\"https:\/\/www.ssh.com\/academy\/ssh\/sshd\" target=\"_blank\" rel=\"nofollow noopener\">sshd<\/a> (the OpenSSH server process) authentication, and remotely gain unauthorized access to the operating system. However, judging by the <a href=\"https:\/\/bsky.app\/profile\/filippo.abyssdomain.expert\/post\/3kowjkx2njy2b\" target=\"_blank\" rel=\"nofollow noopener\">latest information<\/a>, this vulnerability shouldn&#8217;t be classified as an &#8220;authentication bypass&#8221;, but as &#8220;remote code execution&#8221; (<a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/remote-code-execution-rce\/\" target=\"_blank\" rel=\"noopener\">RCE<\/a>). The backdoor intercepts the <a href=\"https:\/\/www.openssl.org\/docs\/manmaster\/man3\/RSA_public_decrypt.html\" target=\"_blank\" rel=\"nofollow noopener\">RSA_public_decrypt<\/a> function, verifies the host&#8217;s signature using the fixed key Ed448 and, if verified successfully, executes malicious code passed by the host via the <em>system()<\/em> function, leaving no traces in the sshd logs.<\/p>\n<h2>Which Linux distributions contain malicious utilities, and which are safe?<\/h2>\n<p>It&#8217;s known that XZ Utils versions 5.6.0 and 5.6.1 were included in the March builds of the following Linux distributions:<\/p>\n<ul>\n<li>Kali Linux, but, according to <a href=\"https:\/\/www.kali.org\/blog\/about-the-xz-backdoor\/\" target=\"_blank\" rel=\"nofollow noopener\">the official blog<\/a>, only those that were available between March 26 and March 29 (the blog also contains instructions for checking for vulnerable versions of utilities);<\/li>\n<li>openSUSE Tumbleweed and openSUSE MicroOS, <a href=\"https:\/\/news.opensuse.org\/2024\/03\/29\/xz-backdoor\/\" target=\"_blank\" rel=\"nofollow noopener\">available from March 7 to March 28<\/a>;<\/li>\n<li>Fedora 41, Fedora Rawhide, and Fedora Linux 40 beta;<\/li>\n<li>Debian (<a href=\"https:\/\/lists.debian.org\/debian-security-announce\/2024\/msg00057.html\" target=\"_blank\" rel=\"nofollow noopener\">testing, unstable and experimental distributions<\/a> only);<\/li>\n<li>Arch Linux \u2013 container images available from February 29 to March 29. However, the website <a href=\"https:\/\/archlinux.org\/news\/the-xz-package-has-been-backdoored\/\" target=\"_blank\" rel=\"nofollow noopener\">archlinux.org<\/a> states that, due to its implementation peculiarities, this attack vector won&#8217;t work in Arch Linux, but they still strongly recommend updating the system.<\/li>\n<\/ul>\n<p>According to official information, Red Hat Enterprise Linux (RHEL), SUSE Linux Enterprise, openSUSE Leap, and Debian Stable are not vulnerable. As for other distributions, it&#8217;s advised to check them for the presence of Trojanized versions of XZ Utils manually.<\/p>\n<h2>How did the malicious code get to be implanted into the XZ Utils?<\/h2>\n<p>Apparently, it was a <a href=\"https:\/\/orca.security\/resources\/blog\/critical-xz-utils-supply-chain-compromise-affects-multiple-linux-distributions-cve-2024-3094\/\" target=\"_blank\" rel=\"nofollow noopener\">typical case<\/a> of control transfer. The person who initially maintained the XZ Libs project on GitHub passed control of the repository to an account that&#8217;s been contributing to a number of repositories related to data compression for several years. And at some point, someone behind that other account implanted a backdoor in the project code.<\/p>\n<h2>The near-miss epidemic that never happened<\/h2>\n<p>According to Igor Kuznetsov, head of our Global Research and Analysis Team (GReAT), exploitation of CVE-2024-3094 could potentially have become the largest scale attack on the Linux ecosystem in its entire history. This is because it was primarily aimed at SSH servers \u2013 the main remote-management tool of all Linux servers on the internet. If it had ended up in stable distributions, we&#8217;d probably have seen vast numbers of server hacks. However, fortunately, CVE-2024-3094 was noticed in the test and rolling distributions \u2013 where the latest software packages are used. That is, most Linux users remained safe. So far we&#8217;ve not detected any cases of CVE-2024-3094 actually being exploited.<\/p>\n<h2>How to stay safe?<\/h2>\n<p>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) <a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2024\/03\/29\/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094\" target=\"_blank\" rel=\"nofollow noopener\">recommends<\/a> anyone who installed or updated affected operating systems in March to downgrade XZ Utils to an earlier version (for example, version 5.4.6) immediately. And also to start searching for malicious activity.<\/p>\n<p>If you&#8217;ve installed a distribution with a vulnerable version of XZ Utils, it also makes sense to change all credentials that could potentially be stolen from the system by the threat actors.<\/p>\n<p>You can detect the presence of a vulnerability using the <a href=\"https:\/\/github.com\/Neo23x0\/signature-base\/blob\/master\/yara\/bkdr_xz_util_cve_2024_3094.yar\" target=\"_blank\" rel=\"nofollow noopener\">Yara rule for CVE-2024-3094<\/a>.<\/p>\n<p>If you suspect that a threat actor may have gained access to your company&#8217;s infrastructure, we recommend using the <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/compromise-assessment?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____\" target=\"_blank\">Kaspersky Compromise Assessment<\/a> service to uncover any past or ongoing attacks.<\/p>\n<p> <input type=\"hidden\" class=\"category_for_banner\" value=\"mdr\" \/><input type=\"hidden\" class=\"placeholder_for_banner\" data-cat_id=\"mdr\" value=\"49670\" \/> <br \/><a href=\"https:\/\/www.kaspersky.com\/blog\/cve-2024-3094-vulnerability-backdoor\/50873\/\" target=\"bwo\" >https:\/\/blog.kaspersky.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2024\/03\/31152754\/CVE-2024-3094-vulnerability-backdoor-featured.jpg\"\/><\/p>\n<p><strong>Credit to Author: Editorial Team| Date: Sun, 31 Mar 2024 19:40:31 +0000<\/strong><\/p>\n<p>Vulnerability CVE-2024-3094. The attackers implanted a backdoor into the compression utilities set XZ Utils versions 5.6.0 and 5.6.1.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10425,10378],"tags":[16099,1001,12177,10496,12321,15278,10752],"class_list":["post-24228","post","type-post","status-publish","format-standard","hentry","category-kaspersky","category-security","tag-backdoors","tag-business","tag-enterprise","tag-linux","tag-smb","tag-supply-chain-attack","tag-vulnerabilities"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24228","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=24228"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24228\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=24228"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=24228"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=24228"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}