Microsoft FAQ and guidance for XZ Utils backdoor vulnerability in Linux distributions


  • Staff

 Microsoft Defender Vulnerability Management Blog:

On March 28, 2024 a backdoor was identified in XZ Utils. This vulnerability, CVE-2024-3094 with a CVSS score of 10 is a result of a software supply chain compromise impacting versions 5.6.0 and 5.6.1 of XZ Utils. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recommended organizations to downgrade to a previous non-compromised XZ Utils version. See below details and Microsoft response for this vulnerability.

Frequently Asked Questions​


What is XZ Utils and what is the library used for?​

XZ Utils is data compression software included in common Linux distributions that plays a crucial role in compressing various file formats, including release tarballs, software packages, kernel images, and initramfs images.

Has this backdoor code been exploited?​

Originally found by a Microsoft employee Andres Freund, the full extent of this vulnerability impact is still being investigated, we know it can be triggered by remote unprivileged systems connecting to SSH ports. This activation can lead to potentially compromise system integrity and performance issues.

What Linux distributions are affected?​

Please see below the list of impacted Linux distributions. As this is a developing situation, we anticipate we will have further clarity for additional distributions and will continue to update this blog as necessary.


Are there patches or mitigations available?​

CISA recommends developers and users to downgrade XZ Utils to an uncompromised version—such as XZ Utils 5.4.6 Stable. See Red Hat’s advisory for more information.

Guidance on using Microsoft products to assess your exposure to CVE-2024-3094​

In the last few days our teams have worked to provide Microsoft customers with enhancements and guidance to assist in detecting software products in your environments which are affected by the vulnerability and a thorough discovery of the impacted devices which have the vulnerable software version installed. Below you will find guidance on how you can use Defender Vulnerability Management, Defender for Cloud and Microsoft Security Exposure Management to start with and we will continue our work and will update this blog with more product updates and guidance.

Microsoft Defender Vulnerability Management​

With Defender Vulnerability Management you see available information about CVE-2024-3094 in the Weaknesses inventory and can assess the presence of this vulnerability in your organization.

Note: you may need to change the default view by adding the ‘Doesn’t affect my organization’ filter option (as the vulnerability may not exist in your environment).

thumbnail image 1 captioned Defender Vulnerability Management weaknesses page

Defender Vulnerability Management weaknesses page

The side panel that opens up when you click the CVE includes detailed description of the vulnerability with potential impact and suggested remediation steps and additional CVE metadata.

thumbnail image 2 captioned Defender Vulnerability Management CVE Details Page

Defender Vulnerability Management CVE Details Page

The vulnerability page provides additional insights such as list of Affected software products, list of Exposed devices which are directly exposed to the vulnerability, and Security recommendations to mitigate risk.

thumbnail image 3 captioned Defender Vulnerability Management vulnerability page

Defender Vulnerability Management vulnerability page

The following advanced hunting queries will allow security teams to perform an immediate assessment of the impact of CVE-2024-3094 on their environment.

This query will provide a list of all installed versions of XZ in your organization:

DeviceTvmSoftwareInventory
| where SoftwareName startswith “liblzma” or SoftwareName startswith “xz”
| summarize dcount(DeviceId) by SoftwareVendor, SoftwareName, SoftwareVersion

This query will provide a list of devices with vulnerable version installed:

DeviceTvmSoftwareInventory
| where SoftwareName startswith “liblzma” or SoftwareName startswith “xz”
| where SoftwareVersion contains “5.6.0” or SoftwareVersion contains “5.6.1”

Defender for Cloud​


Attack Paths​

Defender for Cloud discovers all cloud resources affected by the vulnerability which are also exposed to the internet in SSH ports, and highlights them in the ‘attack path analysis’ page:

thumbnail image 4 captioned Defender for Cloud attack path analysis page

Defender for Cloud attack path analysis page

Use the following attack path title to filter the view only for exposed machines:
  • “Internet exposed Azure VM in SSH port with vulnerable XZ Utils version (CVE-2024-3094)”

Security Explorer queries​

You can use the Security Explorer feature within Defender for Cloud to perform queries related to your posture management across Azure, AWS & GCP, and investigate this specific CVE to find the affected machines and understand the risk associated with them.

We have developed dedicated queries for this CVE, which allow you to quickly gain an initial understanding of the risk posed by this vulnerability to your organization, with customization option:
  • Virtual machines with vulnerable packages, which exposed on port 22 (Link to query)
  • Virtual machines with CVE-2024-3094 detected, and exposed on port 22 (Link to query)
  • Kubernetes pods running vulnerable container images, and exposed on port 22 (Link to query)
thumbnail image 5 captioned Defender for Cloud  security explorer

Defender for Cloud security explorer

Note: The data is rolling out and should be available for all customers in the upcoming day.

Recommendations​

You can use Defender for Cloud recommendations to detect vulnerable resources in your multi-cloud environment (Azure, AWS & GCP) and protect them from exploit:
  • Remediate vulnerabilities - Use Defender for Cloud ‘remediate vulnerabilities’ recommendation to remediate affected VMs and containers across your multi-cloud environment.
  • Secure Management ports - Use Defender for Cloud ‘Secure management ports’ recommendation to ensure the SSH ports on your machines are closed, or at least protected with just-in-time access control (Learn more>).

Microsoft Security Exposure Management​

Recently released in public preview , Exposure Management unifies data and insights from security tools and provides an organizational wide view of exposure and attack paths. We mention this here as it could provide you with additional insight providing further exploration capabilities to the attack path in Defender for Cloud and the integration of attack surface map visualization in exposed devices in Defender Vulnerability Management.

Attack Surface Exploration​

Using the new Attack Surface Map , you can achieve comprehensive visibility into entities, their insights, and relationships within your organization. This tool offers interactive capabilities to visually explore the potential attack paths an attacker could take to traverse the organization, enabling a better understanding of your organization’s attack surface and allowing you to prioritize your focus to protect your critical assets effectively.

Attack Surface Map integration in Microsoft Defender Vulnerability Management provides the ability to further explore the potential impact by accessing the organizational context of each asset. Simply select an exposed device, click on 'View in map,' and gain a clearer understanding of its significance within your environment. This streamlined approach enhances your capability to address vulnerabilities promptly and efficiently.

thumbnail image 6 captioned Defender Vulnerability Management CVE details page and view map feature

Defender Vulnerability Management CVE details page and view map feature

thumbnail image 7 captioned Exposure Management Attack Surface Map

Exposure Management Attack Surface Map


 Source:

 
Back
Top Bottom