{"id":28714,"date":"2024-04-07T08:23:34","date_gmt":"2024-04-07T08:23:34","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=28714"},"modified":"2026-04-17T18:07:38","modified_gmt":"2026-04-17T18:07:38","slug":"xz-utils-supply-chain-backdoor-vulnerability-updated-advisory-cve-2024-3094","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/xz-utils-supply-chain-backdoor-vulnerability-updated-advisory-cve-2024-3094\/","title":{"rendered":"XZ-Utils Supply Chain Backdoor Vulnerability Updated Advisory (CVE-2024-3094)"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><h2 class=\"wp-block-heading\">Vulnerability Overview<\/h2>\n\n\n\n<p>Recently, NSFOCUS CERT detected that the security community disclosed a supply chain backdoor vulnerability in XZ-Utils (CVE-2024-3094), with a CVSS score of 10. Since the underlying layer of SSH relies on liblzma, when certain conditions are met, an attacker can use this vulnerability to bypass SSH authentication and gain unauthorized access on the affected system, thus executing any system command. After investigation, it is found that the tarball upstream software package of xz infects a backdoor program. The backdoor extracts the .o file from the disguised test file during the building process, and then uses the extracted file to modify specific functions in liblzma, resulting in the generation of a modified liblzma library. Any software linked to this library may use it to intercept and modify data interaction with this library. At present, the vulnerability PoC has been made public. Relevant users are requested to take measures as soon as possible for troubleshooting and protection.<\/p>\n\n\n\n<p>XZ-Utils is a tool library suite widely used for processing .xz files in Linux, Unix and other POSIX compatible systems, including components such as liblzma and xz, which are integrated in the vast majority of Linux distribution repositories. NSFOCUS CERT has been successfully reproduced this vulnerability:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/0407a.jpg\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"577\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/0407a-1024x577.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-28715\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/0407a-1024x577.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/0407a-300x169.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/0407a-768x433.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/0407a-150x85.jpg 150w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/0407a-600x338.jpg 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/0407a-200x113.jpg 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/0407a.jpg 1456w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>Reference link:<\/p>\n\n\n\n<p><a href=\"https:\/\/tukaani.org\/xz-backdoor\/%20\">https:\/\/tukaani.org\/xz-backdoor\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.openwall.com\/lists\/oss-security\/2024\/03\/29\/4\">https:\/\/www.openwall.com\/lists\/oss-security\/2024\/03\/29\/4<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Background<\/h2>\n\n\n\n<p>n October 2021, JiaT75, the developer who implanted backdoor vulnerabilities, began to participate in the development of XZ-Utils project and gradually gained trust. It took over the maintenance authority of the project in 2023. In February 2024, it submitted malicious files to liblzma\/xz, introduced a hidden backdoor that allowed attackers to access SSH without authorization, and contacted the maintainer of Linux distribution. Libraries with backdoors were required to be packaged and distributed to end users, and developer Andres Freund discovered this supply chain attack activity on March 29 when analyzing SSH performance failures. GitHub has now shut down the entire XZ-Utils project.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/0407b.jpg\"><img decoding=\"async\" width=\"1011\" height=\"377\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/0407b.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-28717\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/0407b.jpg 1011w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/0407b-300x112.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/0407b-768x286.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/0407b-600x224.jpg 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/0407b-200x75.jpg 200w\" sizes=\"(max-width: 1011px) 100vw, 1011px\" \/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Backdoor analysis<\/h2>\n\n\n\n<p>When the sshd process linked to the malicious dynamic database is started, the malicious code in liblzma.so will modify the pointing address of the RSA_public_decrypt function symbol through Hook technology. When the sshd process receives a new SSH login request, it triggers the RSA_public_decrypt function to verify the signature of related payload fields. After the verification, the attack payload hidden in the certificate field is extracted and passed to the system function for arbitrary code execution. <\/p>\n\n\n\n<p>Trigger conditions:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The process path name is \/usr\/sbin\/sshd.<\/li>\n\n\n\n<li>LANG environment variable exists<\/li>\n\n\n\n<li>LD_DEBUG, LD_PROFILE environment variables do not exist<\/li>\n<\/ul>\n\n\n\n<p>The attacker then constructs an attack payload according to a specific message format, wrapping the command to be executed (passed into the system function) in the certificate field:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/0407c.jpg\"><img decoding=\"async\" width=\"428\" height=\"720\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/0407c.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-28719\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/0407c.jpg 428w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/0407c-178x300.jpg 178w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/0407c-200x336.jpg 200w\" sizes=\"(max-width: 428px) 100vw, 428px\" \/><\/a><\/figure>\n\n\n\n<p>The sshd process uses RSA_public_decrypt to decrypt (verify) the payload of this segment. Then, it accesses a function that is hijacked by an attacker and verifies the workload of this segment. It sends the cmd command filled in earlier to the system function for execution. Since this step involves the verification of public and private key pairs, load that cannot pass correct decryption\/verification will not trigger subsequent system execution. Therefore, for liblzma.5.6.0 and liblzma5.6.1 files pre-introduced by the original attacker, only the attacker itself can realize backdoor exploitation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Scope of Impact<\/h2>\n\n\n\n<p><strong>Affected Version<\/strong><a><\/a><a><strong><\/strong><\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>XZ&nbsp;Utils&nbsp;=&nbsp;5.6.0 &#8211; 5.6.1<\/li>\n<\/ul>\n\n\n\n<p>Note: No malicious code is found in the Git distribution version of XZ, and it only exists in the complete download package.<br>Affected Linux distribution: <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Fedora Rawhide (development version)<\/li>\n\n\n\n<li>Fedora&nbsp;41<\/li>\n\n\n\n<li>MACOS HomeBrew x64openSUSE Tumbleweed and MicroOS (released March 7-28)<\/li>\n\n\n\n<li>Kali Linux (xz-utils 5.6.0-0.2 released March 26-28)<\/li>\n\n\n\n<li>Debian (XZ beta version 5.5.1alpha-0.1 to 5.6.1-1)<\/li>\n<\/ul>\n\n\n\n<p><strong>XZ Supply Chain Impact System Query: https:\/\/repology.org\/project\/xz\/version<\/strong><\/p>\n\n\n\n<p><strong>Unaffected version<\/strong><strong><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>XZ&nbsp;Utils&nbsp;&lt;&nbsp;5.6.0<\/li>\n\n\n\n<li>XZ&nbsp;Utils &gt;= 5.8.0<\/li>\n<\/ul>\n\n\n\n<p>Note: As the developer of the implanted backdoor has been involved in maintenance since 2021, it is recommended that users downgrade XZ-Utils to 5.4 or earlier for safety reasons. CentOS\/Redhat\/Ubuntu\/Debian\/Fedora and other stable warehouses are not affected.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Detection<\/h2>\n\n\n\n<p>You can run the following command to determine whether the xz in use is the affected version:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-cyan-bluish-gray-background-color has-background\"><tbody><tr><td>xz &#8211;version<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/0407d.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"644\" height=\"88\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/0407d.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-28721\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/0407d.jpg 644w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/0407d-300x41.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/0407d-600x82.jpg 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/0407d-640x88.jpg 640w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/0407d-200x27.jpg 200w\" sizes=\"(max-width: 644px) 100vw, 644px\" \/><\/a><\/figure>\n\n\n\n<p><strong>Script troubleshooting<\/strong><\/p>\n\n\n\n<p>Relevant users can also use the scripts published on Openwall to check whether the system is infected with backdoor:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/0407e.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1019\" height=\"1001\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/0407e.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-28724\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/0407e.png 1019w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/0407e-300x295.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/0407e-768x754.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/0407e-600x589.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/0407e-200x196.png 200w\" sizes=\"(max-width: 1019px) 100vw, 1019px\" \/><\/a><\/figure>\n\n\n\n<p>It needs to be determined whether the binary data of the liblzma library file that the SSHD program depends on contains backdoor signatures.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Mitigation<\/h2>\n\n\n\n<p>At present, the officially released pure version 5.8.0 for this backdoor vulnerability. The download link is https:\/\/git.tukaani.org\/. Relevant users can also downgrade xz-utils to a version earlier than 5.6 or replace it with 7zip and other components in applications. Note: The brew update has been rolled back from 5.6.1 to 5.4.6; Debian released an updated version of xz utils, with the version number of 5.6.1 + really 5.4.5.<\/p>\n\n\n\n<p><strong>Other Recommendations<\/strong><\/p>\n\n\n\n<p>Establish a supply chain management system for product procurement and open source software, improve the safety management of application development life cycle, strengthen the monitoring of upstream and downstream threat intelligence of software, and timely grasp the security risks of applications and products.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Statement<\/h2>\n\n\n\n<p>This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and\/or indirect consequences and losses caused by transmitting and\/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add\/delete any information to\/from it, or use this advisory for commercial purposes without permission from NSFOCUS.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About NSFOCUS<\/h2>\n\n\n\n<p>NSFOCUS, a pioneering leader in cybersecurity, is dedicated to safeguarding telecommunications, Internet service providers, hosting providers, and enterprises from sophisticated cyberattacks.<\/p>\n\n\n\n<p>Founded in 2000, NSFOCUS operates globally with over 4000 employees at two headquarters in Beijing, China, and Santa Clara, CA, USA, and over 50 offices worldwide. It has a proven track record of protecting over 25% of the Fortune Global 500 companies, including four of the five largest banks and six of the world&acirc;&euro;&trade;s top ten telecommunications companies.<\/p>\n\n\n\n<p>Leveraging technical prowess and innovation, NSFOCUS delivers a comprehensive suite of security solutions, including the Intelligent Security Operations Platform (ISOP) for modern SOC, DDoS Protection, Continuous Threat Exposure Management (CTEM) Service and Web Application and API Protection (WAAP). All the solutions and services are augmented by the Security Large Language Model (SecLLM), ML, patented algorithms and other cutting-edge research achievements developed by NSFOCUS.<\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>Vulnerability Overview Recently, NSFOCUS CERT detected that the security community disclosed a supply chain backdoor vulnerability in XZ-Utils (CVE-2024-3094), with a CVSS score of 10. Since the underlying layer of SSH relies on liblzma, when certain conditions are met, an attacker can use this vulnerability to bypass SSH authentication and gain unauthorized access on the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":28664,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3,5],"tags":[310,768],"class_list":["post-28714","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-ddos-mitigation","tag-cve-2024-3094-2","tag-xz-utils"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>XZ-Utils Supply Chain Backdoor Vulnerability Updated Advisory (CVE-2024-3094) - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"XZ-Utils Supply Chain Backdoor Vulnerability Updated Advisory (CVE-2024-3094) - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Vulnerability Overview Recently, NSFOCUS CERT detected that the security community disclosed a supply chain backdoor vulnerability in XZ-Utils\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/xz-utils-supply-chain-backdoor-vulnerability-updated-advisory-cve-2024-3094\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-07T08:23:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/Critical.png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"XZ-Utils Supply Chain Backdoor Vulnerability Updated Advisory (CVE-2024-3094) - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Vulnerability Overview Recently, NSFOCUS CERT detected that the security community disclosed a supply chain backdoor vulnerability in XZ-Utils\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/Critical.png\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/xz-utils-supply-chain-backdoor-vulnerability-updated-advisory-cve-2024-3094\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/xz-utils-supply-chain-backdoor-vulnerability-updated-advisory-cve-2024-3094\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"XZ-Utils Supply Chain Backdoor Vulnerability Updated Advisory (CVE-2024-3094)\",\"datePublished\":\"2024-04-07T08:23:34+00:00\",\"dateModified\":\"2026-04-17T18:07:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/xz-utils-supply-chain-backdoor-vulnerability-updated-advisory-cve-2024-3094\\\/\"},\"wordCount\":1088,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/xz-utils-supply-chain-backdoor-vulnerability-updated-advisory-cve-2024-3094\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Critical.png\",\"keywords\":[\"CVE-2024-3094\",\"XZ-Utils\"],\"articleSection\":[\"Blog\",\"DDoS Mitigation\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/xz-utils-supply-chain-backdoor-vulnerability-updated-advisory-cve-2024-3094\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/xz-utils-supply-chain-backdoor-vulnerability-updated-advisory-cve-2024-3094\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/xz-utils-supply-chain-backdoor-vulnerability-updated-advisory-cve-2024-3094\\\/\",\"name\":\"XZ-Utils Supply Chain Backdoor Vulnerability Updated Advisory (CVE-2024-3094) - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/xz-utils-supply-chain-backdoor-vulnerability-updated-advisory-cve-2024-3094\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/xz-utils-supply-chain-backdoor-vulnerability-updated-advisory-cve-2024-3094\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Critical.png\",\"datePublished\":\"2024-04-07T08:23:34+00:00\",\"dateModified\":\"2026-04-17T18:07:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/xz-utils-supply-chain-backdoor-vulnerability-updated-advisory-cve-2024-3094\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/xz-utils-supply-chain-backdoor-vulnerability-updated-advisory-cve-2024-3094\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/xz-utils-supply-chain-backdoor-vulnerability-updated-advisory-cve-2024-3094\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Critical.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Critical.png\",\"width\":169,\"height\":107,\"caption\":\"Critical alert icon with shield symbol.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/xz-utils-supply-chain-backdoor-vulnerability-updated-advisory-cve-2024-3094\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"XZ-Utils Supply Chain Backdoor Vulnerability Updated Advisory (CVE-2024-3094)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"XZ-Utils Supply Chain Backdoor Vulnerability Updated Advisory (CVE-2024-3094) - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"XZ-Utils Supply Chain Backdoor Vulnerability Updated Advisory (CVE-2024-3094) - NSFOCUS","og_description":"Vulnerability Overview Recently, NSFOCUS CERT detected that the security community disclosed a supply chain backdoor vulnerability in XZ-Utils","og_url":"https:\/\/nsfocusglobal.com\/xz-utils-supply-chain-backdoor-vulnerability-updated-advisory-cve-2024-3094\/","og_site_name":"NSFOCUS","article_published_time":"2024-04-07T08:23:34+00:00","article_modified_time":"2026-04-17T18:07:38+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/Critical.png","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"XZ-Utils Supply Chain Backdoor Vulnerability Updated Advisory (CVE-2024-3094) - NSFOCUS","twitter_description":"Vulnerability Overview Recently, NSFOCUS CERT detected that the security community disclosed a supply chain backdoor vulnerability in XZ-Utils","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/Critical.png","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/xz-utils-supply-chain-backdoor-vulnerability-updated-advisory-cve-2024-3094\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/xz-utils-supply-chain-backdoor-vulnerability-updated-advisory-cve-2024-3094\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"XZ-Utils Supply Chain Backdoor Vulnerability Updated Advisory (CVE-2024-3094)","datePublished":"2024-04-07T08:23:34+00:00","dateModified":"2026-04-17T18:07:38+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/xz-utils-supply-chain-backdoor-vulnerability-updated-advisory-cve-2024-3094\/"},"wordCount":1088,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/xz-utils-supply-chain-backdoor-vulnerability-updated-advisory-cve-2024-3094\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/Critical.png","keywords":["CVE-2024-3094","XZ-Utils"],"articleSection":["Blog","DDoS Mitigation"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/xz-utils-supply-chain-backdoor-vulnerability-updated-advisory-cve-2024-3094\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/xz-utils-supply-chain-backdoor-vulnerability-updated-advisory-cve-2024-3094\/","url":"https:\/\/nsfocusglobal.com\/xz-utils-supply-chain-backdoor-vulnerability-updated-advisory-cve-2024-3094\/","name":"XZ-Utils Supply Chain Backdoor Vulnerability Updated Advisory (CVE-2024-3094) - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/xz-utils-supply-chain-backdoor-vulnerability-updated-advisory-cve-2024-3094\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/xz-utils-supply-chain-backdoor-vulnerability-updated-advisory-cve-2024-3094\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/Critical.png","datePublished":"2024-04-07T08:23:34+00:00","dateModified":"2026-04-17T18:07:38+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/xz-utils-supply-chain-backdoor-vulnerability-updated-advisory-cve-2024-3094\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/xz-utils-supply-chain-backdoor-vulnerability-updated-advisory-cve-2024-3094\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/xz-utils-supply-chain-backdoor-vulnerability-updated-advisory-cve-2024-3094\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/Critical.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/Critical.png","width":169,"height":107,"caption":"Critical alert icon with shield symbol."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/xz-utils-supply-chain-backdoor-vulnerability-updated-advisory-cve-2024-3094\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"XZ-Utils Supply Chain Backdoor Vulnerability Updated Advisory (CVE-2024-3094)"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/28714","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=28714"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/28714\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/28664"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=28714"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=28714"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=28714"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}