[Threatview.io] ⚠️ Resources for responding to #CVE-2024-3094
1. Check if impacted by CVE-2024-3094 i.e running 5.5.1alpha-0.1, 5.6.0 till 5.6.1-1 of xz utils ❓
❌ xz -V
✔️ strings /usr/local/bin/xz | grep "(XZ Utils)"
✔️strings `which xz` | grep "(XZ Utils"
✔️for xz_p in $(type -a xz | awk '{print $NF}' | uniq); do strings "$xz_p" | grep "xz (XZ Utils)" || echo "No match found for $xz_p"; done
2. Detailed analysis along with exploit code and detection : https://www.openwall.com/lists/oss-security/2024/03/29/4
✔️Confirmed #Debian Stable and OpenWRT are not impacted by CVE-2024-3094
⚠️Homebrew, Kali Linux and Debian, Alpine, RedHat and other flavors of linux using repository - Unstable/ Experimental/ BleedingEdge
3. Mitigation suggested: Downgrade to an uncompromised XZ Utils version (earlier than 5.6.0)
#Threathunt for any malicious or suspicious activity on systems where affected versions have been installed.
4. #ThreatHunt query if using Defender & Sentinel
https://github.com/Bert-JanP/Hunting-Queries-Detection-Rules/blob/main/Vulnerability%20Management/InboundSSHConnectionToVulnerableXZMachine.md
5. #YARA rule: https://github.com/Neo23x0/signature-base/blob/master/yara/bkdr_xz_util_cve_2024_3094.yar
6. Added hashes to Threatview.io OSINT Feeds :)
🛩️
