Jan 6, 2026·7 min read·15 visits
A malicious actor spent years gaining trust to become an open-source maintainer, then injected a highly obfuscated backdoor into a core Linux compression library (XZ/liblzma). The backdoor targets SSH servers, allowing complete system takeover. A lone developer noticed a 500ms login delay and unraveled one of the most audacious supply chain attacks ever conceived.
CVE-2024-3094 documents a sophisticated, multi-year supply chain attack targeting the XZ Utils data compression library, a ubiquitous component in most Linux distributions. Malicious code was deliberately and stealthily inserted into the release tarballs for versions 5.6.0 and 5.6.1. This code, activated during the software build process, creates a backdoor in the `liblzma` library, specifically targeting OpenSSH servers to allow remote, unauthenticated attackers to execute arbitrary code. The discovery of this backdoor, which narrowly averted a global security catastrophe, was made by a developer investigating a minor performance lag in SSH connections.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H| Product | Affected Versions | Fixed Version |
|---|---|---|
XZ Utils tukaani | 5.6.0 | Revert to < 5.6.0 |
XZ Utils tukaani | 5.6.1 | Revert to < 5.6.0 |
| Attribute | Detail |
|---|---|
| CWE ID | CWE-506: Embedded Malicious Code |
| Attack Vector | Network (AV:N) |
| Attack Complexity | Low (AC:L) |
| Privileges Required | None (PR:N) |
| Impact | Complete system compromise (Confidentiality, Integrity, Availability are all High) |
| CVSS v3.1 Score | 10.0 (Critical) |
| EPSS Score | 85.99% (Probability of exploitation) |
| KEV Status | Not Listed (Discovered before widespread exploitation) |
The product contains code that appears to be a backdoor or hidden functionality.