• SecurePath for Auto Dealers
  • Services
    • SOC Reporting Services
      • SOC 2® Readiness Assessment
      • SOC 2® Reports
      • SOC 3® Reports
      • SOC for Cybersecurity® Reports
    • IT Advisory Services
      • IT Vulnerability Assessment
      • Network Penetration Testing
      • Privileged Access Management
      • Social Engineering Testing
      • Virtual CISO (vCISO)
      • Written Information Security Program (“WISP”)
      • IT General Controls Audit & Compliance
    • IT Government Compliance
      • CMMC Cybersecurity Services & Compliance
      • DFARS Compliance
      • FTC Safeguards Compliance
  • Industries
    • Financial Services
    • Government
    • Auto Dealerships
    • Enterprise
  • Blog
  • About Us
    • Meet The Team
    • Jobs
  • Contact Us

Call us today! 844-OCD-TECH

Find our Location
OCD TechOCD Tech
  • SecurePath for Auto Dealers
  • Services
    • SOC Reporting Services
      • SOC 2® Readiness Assessment
      • SOC 2® Reports
      • SOC 3® Reports
      • SOC for Cybersecurity® Reports
    • IT Advisory Services
      • IT Vulnerability Assessment
      • Network Penetration Testing
      • Privileged Access Management
      • Social Engineering Testing
      • Virtual CISO (vCISO)
      • Written Information Security Program (“WISP”)
      • IT General Controls Audit & Compliance
    • IT Government Compliance
      • CMMC Cybersecurity Services & Compliance
      • DFARS Compliance
      • FTC Safeguards Compliance
  • Industries
    • Financial Services
    • Government
    • Auto Dealerships
    • Enterprise
  • Blog
  • About Us
    • Meet The Team
    • Jobs
  • Contact Us
Critical-Vulnerability-Cybersecurity

Critical Vulnerability In Exim Email Servers

June 13, 2019 Posted by Scott Goodwin IT Security

A critical remote command execution vulnerability was recently identified within Exim, the UNIX based mail transfer agent. The vulnerability, tracked as CVE-2019-10149, affects Exim versions 4.87 through 4.91, and there is no patch as of today for these older versions. The latest version of Exim released February 10, 2019, Exim 4.92, is not affected by this vulnerability.

The exploitation of CVE-2019-10149 allows for an attacker to execute commands with full administrative permissions on the target systems. This is due to the fact that the Exim mail transfer agent runs with root level privileges. This means that an attacker that successfully exploits this vulnerability could install additional malicious software; view, change, or delete data; or create backdoor user accounts with full administrative privileges.

The vulnerability may be exploited by sending a specially crafted email message to a specific email address on a system’s localhost. A flaw was discovered in the way that Exim parses the email data, and this flaw can be leveraged in such a way that allows the attacker to pass an arbitrary command to the execsv() function, which executes the command as root behind the scenes. For example, by sending a malicious email to a specific address, the attacker may be able to force the system to download additional malware, create a new user, or upload sensitive system information to an internet-accessible server owned and operated by the attacker.

The severity of any vulnerability is directly related to its exploitability. For complex bugs that require significant time and resources to develop a working exploit, the risk is considered lower than for those vulnerabilities where a fully functional exploit is available. The mechanism required to exploit the Exim flaw has been deemed “trivial”, and is therefore easily exploitable by unsophisticated attackers. In fact, a full functional exploit has been developed and released to Exploit-DB.com, a popular online repository of exploit code.

Here at OCD Tech, we conducted some simple analysis to identify just how many vulnerable systems might exist on the internet. A search was conducted using the Shodan search engine which revealed that approximately 4 million systems around the world are running vulnerable versions of Exim. If you are running Exim on any of your systems, we would strongly suggest upgrading to version 4.92 as soon as possible, as it is only a matter of time before widespread exploitation of this critical vulnerability begins.

Tags: cyber attackscybersecuritydata breachdata protectionhackersmalwarevulnerability
Share
0
Scott Goodwin

About Scott Goodwin

Scott manages the Information Security Advisory Services practice within OCD Tech. Prior to joining the firm, he graduated from the University of Massachusetts Boston with a degree in Physics. Scott’s primary engagements include security advisory services, and security assessments against industry standard frameworks including NIST 800-53 and the NIST Cybersecurity Framework, as well as NIST 800-171 assessments for multiple clients in the defense and aerospace sector. Currently, Scott oversees many technical engagements, including vulnerability assessments, and is a lead penetration tester for OCD Tech.  Scott is directly responsible for the identification of three (3) previously unknown vendor software vulnerabilities which have been registered with Mitre’s Common Vulnerabilities and Exposures (CVE) database as CVE-2018-11628, 2019-7004, and 2019-19774.  Scott is also the key developer on the OCD Tech open source discovery platform, Scrapy. The platform identifies public domain information and provides reporting and alerting for OCD Tech clients upon discovery of key sensitive company/personal information.

You also might be interested in

Scraping Social Security Numbers on the Web

Scraping Social Security Numbers on the Web

Oct 1, 2018

One of the most accredited forms of validation for a citizen's identity is a Social Security Number.

Debunking Cybersecurity Creepy Myths

Debunking Cybersecurity Creepy Myths

Nov 3, 2023

Cybersecurity is a topic that’s gained significant attention over the[...]

ftc safeguards

FTC Safeguards

Jun 11, 2024

Protecting Information & Avoiding Penalties  Safeguarding customer information is paramount[...]

Find us on

Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Send Message
OCD Tech logo Audit. Security. Assurance.

IT Audit | Cybersecurity | IT Assurance | IT Security Consultants – OCD Tech is a technology consulting firm serving the IT security and consulting needs of businesses in Boston (MA), Braintree (MA) and across New England. We primarily serve Fortune 500 companies including auto dealers, financial institutions, higher education, government contractors, and not-for-profit organizations with SOC 2 reporting, CMMC readiness, IT Security Audits, Penetration Testing and Vulnerability Assessments. We also provide dark web monitoring, DFARS compliance, and IT general controls review.

Contact Info

  • OCD Tech
  • 25 BHOP, Suite 407, Braintree MA, 02184
  • 844-623-8324
  • https://ocd-tech.com

Follow Us

Videos

Check Out the Latest Videos From OCD Tech!

Services

SOC Reporting Services
– SOC 2 ® Readiness Assessment
– SOC 2 ®
– SOC 3 ®
– SOC for Cybersecurity ®

IT Advisory Services
– IT Vulnerability Assessment
– Penetration Testing
– Privileged Access Management
– Social Engineering
– WISP
– General IT Controls Review

IT Government Compliance Services
– CMMC
– DFARS Compliance
– FTC Safeguards vCISO

Industries

  • Financial Services
  • Government
  • Enterprise
  • Auto Dealerships

© 2025 — OCD Tech: IT Audit - Cybersecurity - IT Assurance

  • OCD Tech
  • About Us
  • Contact Us
Prev Next