Skip to content
Back to Security
9.5 Critical CVE-2024-3094

XZ Utils Backdoor — CVE-2024-3094 Deep Dive

How a supply chain attacker spent two years building trust before planting a backdoor in a critical compression library.

ATT&CK: T1195.001, T1059
supply-chain linux backdoor

What Happened

In March 2024, Andres Freund discovered a backdoor in XZ Utils versions 5.6.0 and 5.6.1. The attacker, operating as “Jia Tan,” spent nearly two years making legitimate contributions before introducing the malicious code.

Impact

The backdoor targeted sshd on systemd-based systems, allowing an attacker with the corresponding private key to execute arbitrary commands as root, bypassing authentication entirely.

Remediation

Downgrade to XZ Utils ≤ 5.4.x. Check with xz --version. Most major distributions released emergency patches within 48 hours.

Key Takeaway

This attack succeeded because it exploited the trust model of open-source maintainership, not a technical weakness. Review your critical dependency graph and monitor maintainer transitions.