Palo Alto Networks Security Advisories /CVE-2024-3094CVE-2024-3094 Informational: Impact of Malicious Code in XZ Tools and Libraries (CVE-2024-3094)InformationalNVDJSON Published2024-04-01 Updated2024-04-01ReferenceDiscoveredexternallyDescriptionThe Palo Alto Networks Product Security Assurance team has evaluated the supply chain compromise impacting versions 5.6.0 and 5.6.1 of XZ tools and libraries. These versions of the software may allow unauthorized access to affected systems.Based on the information presently known, Palo Alto Networks products and cloud services do not contain affected XZ software packages and are not impacted by these issues.Please refer to the Unit42 Threat Brief for the latest guidance and product offerings to protect customers from CVE-2024-3094 in their environments: https://unit42.paloaltonetworks.com/threat-brief-xz-utils-cve-2024-3094/CVESummaryCVE-2024-3094Malicious code in distributed source tarballs of xz, starting with version 5.6.0Product StatusVersionsAffectedUnaffectedCloud NGFW NoneallCortex XDR NoneallCortex XDR Agent NoneallGlobalProtect App NoneallPAN-OS NoneallPrisma Access NoneallPrisma Cloud NoneallPrisma Cloud Compute NoneallWeakness TypeCWE-506: Embedded Malicious CodeSolutionNo software updates are required at this time.Timeline2024-04-01Initial Publication