{"api_version":"1","generated_at":"2026-04-23T14:03:08+00:00","cve":"CVE-2024-3094","urls":{"html":"https://cve.report/CVE-2024-3094","api":"https://cve.report/api/cve/CVE-2024-3094.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2024-3094","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2024-3094"},"summary":{"title":"CVE-2024-3094","description":"Description unavailable.","state":"PUBLISHED","assigner":"","published_at":"2024-03-29 17:15:00","updated_at":"2024-04-03 06:15:00"},"problem_types":["CWE-506"],"metrics":[],"references":[{"url":"https://research.swtch.com/xz-timeline","name":"https://research.swtch.com/xz-timeline","refsource":"","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://aws.amazon.com/security/security-bulletins/AWS-2024-002/","name":"https://aws.amazon.com/security/security-bulletins/AWS-2024-002/","refsource":"","tags":["Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.redhat.com/en/blog/urgent-security-alert-fedora-41-and-rawhide-users","name":"https://www.redhat.com/en/blog/urgent-security-alert-fedora-41-and-rawhide-users","refsource":"","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://discourse.nixos.org/t/cve-2024-3094-malicious-code-in-xz-5-6-0-and-5-6-1-tarballs/42405","name":"https://discourse.nixos.org/t/cve-2024-3094-malicious-code-in-xz-5-6-0-and-5-6-1-tarballs/42405","refsource":"","tags":["Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://twitter.com/infosecb/status/1774595540233167206","name":"https://twitter.com/infosecb/status/1774595540233167206","refsource":"","tags":["Press/Media Coverage"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://bugzilla.suse.com/show_bug.cgi?id=1222124","name":"https://bugzilla.suse.com/show_bug.cgi?id=1222124","refsource":"","tags":["Issue Tracking","Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://twitter.com/debian/status/1774219194638409898","name":"https://twitter.com/debian/status/1774219194638409898","refsource":"","tags":["Press/Media Coverage"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://bugs.gentoo.org/928134","name":"https://bugs.gentoo.org/928134","refsource":"","tags":["Issue Tracking","Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://xeiaso.net/notes/2024/xz-vuln/","name":"https://xeiaso.net/notes/2024/xz-vuln/","refsource":"","tags":["Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://news.ycombinator.com/item?id=39877267","name":"https://news.ycombinator.com/item?id=39877267","refsource":"","tags":["Issue Tracking"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094","name":"https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094","refsource":"","tags":["Third Party Advisory","US Government Resource"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068024","name":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068024","refsource":"","tags":["Mailing List","Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://openssf.org/blog/2024/03/30/xz-backdoor-cve-2024-3094/","name":"https://openssf.org/blog/2024/03/30/xz-backdoor-cve-2024-3094/","refsource":"","tags":["Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/karcherm/xz-malware","name":"https://github.com/karcherm/xz-malware","refsource":"","tags":["Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://twitter.com/LetsDefendIO/status/1774804387417751958","name":"https://twitter.com/LetsDefendIO/status/1774804387417751958","refsource":"","tags":["Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://gynvael.coldwind.pl/?lang=en&id=782","name":"https://gynvael.coldwind.pl/?lang=en&id=782","refsource":"","tags":["Technical Description","Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://arstechnica.com/security/2024/03/backdoor-found-in-widely-used-linux-utility-breaks-encrypted-ssh-connections/","name":"https://arstechnica.com/security/2024/03/backdoor-found-in-widely-used-linux-utility-breaks-encrypted-ssh-connections/","refsource":"","tags":["Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://tukaani.org/xz-backdoor/","name":"https://tukaani.org/xz-backdoor/","refsource":"","tags":["Issue Tracking","Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://lwn.net/Articles/967180/","name":"https://lwn.net/Articles/967180/","refsource":"","tags":["Issue Tracking","Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://news.ycombinator.com/item?id=39865810","name":"https://news.ycombinator.com/item?id=39865810","refsource":"","tags":["Issue Tracking","Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2272210","name":"RHBZ#2272210","refsource":"","tags":["Issue Tracking","Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://ariadne.space/2024/04/02/the-xz-utils-backdoor-is-a-symptom-of-a-larger-problem/","name":"https://ariadne.space/2024/04/02/the-xz-utils-backdoor-is-a-symptom-of-a-larger-problem/","refsource":"","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://lists.freebsd.org/archives/freebsd-security/2024-March/000248.html","name":"https://lists.freebsd.org/archives/freebsd-security/2024-March/000248.html","refsource":"","tags":["Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://news.ycombinator.com/item?id=39895344","name":"https://news.ycombinator.com/item?id=39895344","refsource":"","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.kali.org/blog/about-the-xz-backdoor/","name":"https://www.kali.org/blog/about-the-xz-backdoor/","refsource":"","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://twitter.com/infosecb/status/1774597228864139400","name":"https://twitter.com/infosecb/status/1774597228864139400","refsource":"","tags":["Press/Media Coverage"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://security.archlinux.org/CVE-2024-3094","name":"https://security.archlinux.org/CVE-2024-3094","refsource":"","tags":["Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/amlweems/xzbot","name":"https://github.com/amlweems/xzbot","refsource":"","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://boehs.org/node/everything-i-know-about-the-xz-backdoor","name":"https://boehs.org/node/everything-i-know-about-the-xz-backdoor","refsource":"","tags":["Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.openwall.com/lists/oss-security/2024/03/29/4","name":"https://www.openwall.com/lists/oss-security/2024/03/29/4","refsource":"","tags":["Mailing List"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://access.redhat.com/security/cve/CVE-2024-3094","name":"https://access.redhat.com/security/cve/CVE-2024-3094","refsource":"","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.vicarius.io/vsociety/vulnerabilities/cve-2024-3094","name":"https://www.vicarius.io/vsociety/vulnerabilities/cve-2024-3094","refsource":"","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://gist.github.com/thesamesam/223949d5a074ebc3dce9ee78baad9e27","name":"https://gist.github.com/thesamesam/223949d5a074ebc3dce9ee78baad9e27","refsource":"","tags":["Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://lists.debian.org/debian-security-announce/2024/msg00057.html","name":"https://lists.debian.org/debian-security-announce/2024/msg00057.html","refsource":"","tags":["Mailing List","Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/advisories/GHSA-rxwq-x6h5-x525","name":"https://github.com/advisories/GHSA-rxwq-x6h5-x525","refsource":"","tags":["Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://security.alpinelinux.org/vuln/CVE-2024-3094","name":"https://security.alpinelinux.org/vuln/CVE-2024-3094","refsource":"","tags":["Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.darkreading.com/vulnerabilities-threats/are-you-affected-by-the-backdoor-in-xz-utils","name":"https://www.darkreading.com/vulnerabilities-threats/are-you-affected-by-the-backdoor-in-xz-utils","refsource":"","tags":["Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://security-tracker.debian.org/tracker/CVE-2024-3094","name":"https://security-tracker.debian.org/tracker/CVE-2024-3094","refsource":"","tags":["Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://research.swtch.com/xz-script","name":"https://research.swtch.com/xz-script","refsource":"","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.theregister.com/2024/03/29/malicious_backdoor_xz/","name":"https://www.theregister.com/2024/03/29/malicious_backdoor_xz/","refsource":"","tags":["Press/Media Coverage"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.tenable.com/blog/frequently-asked-questions-cve-2024-3094-supply-chain-backdoor-in-xz-utils","name":"https://www.tenable.com/blog/frequently-asked-questions-cve-2024-3094-supply-chain-backdoor-in-xz-utils","refsource":"","tags":["Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://ubuntu.com/security/CVE-2024-3094","name":"https://ubuntu.com/security/CVE-2024-3094","refsource":"","tags":["Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://security.netapp.com/advisory/ntap-20240402-0001/","name":"https://security.netapp.com/advisory/ntap-20240402-0001/","refsource":"","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2024-3094","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-3094","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2024","cve_id":"3094","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"tukaani","cpe5":"xz","cpe6":"5.6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2024","cve_id":"3094","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"tukaani","cpe5":"xz","cpe6":"5.6.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2024-3094","qid":"379548","title":"XZ Utils SSH Backdoor Versions Detected (CVE-2024-3094)"},{"cve":"CVE-2024-3094","qid":"379582","title":"XZ Utils SSH Backdoor Versions Detected for MacOS"},{"cve":"CVE-2024-3094","qid":"48253","title":"Possible Exposure to xzlib Detected on MacOS"},{"cve":"CVE-2024-3094","qid":"710884","title":"Gentoo Linux XZ utils Backdoor in release tarballs Vulnerability (GLSA 202403-04)"}]},"source_records":{"cve_program":null,"nvd":{"publishedDate":"2024-03-29 17:15:00","lastModifiedDate":"2024-04-03 06:15:00","problem_types":["CWE-506"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":10,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:tukaani:xz:5.6.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:tukaani:xz:5.6.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}