April 26, 2025
5
min read
OCD Tech

Critical Vulnerability In Exim Email Servers

Editor
OCD Tech
Category
Cybersecurity
Date
April 26, 2025

A critical remotecommand execution vulnerability was recently identified within Exim, the UNIXbased mail transfer agent. The vulnerability, tracked as CVE-2019-10149, affectsExim versions 4.87 through 4.91, and there is no patch as of today for theseolder versions. The latest version of Exim released February 10, 2019, Exim4.92, is not affected by this vulnerability.

The exploitation of CVE-2019-10149 allows for an attacker to execute commands with full administrative permissions on the target systems. This is due to the fact that the Exim mail transfer agent runs with root level privileges. This means that an attacker that successfully exploits this vulnerability could install additional malicious software; view, change, or delete data; or create backdoor user accounts with full administrative privileges.

Thevulnerability may be exploited by sending a specially crafted email message toa specific email address on a system’s localhost. A flaw was discovered in theway that Exim parses the email data, and this flaw can be leveraged in such away that allows the attacker to pass an arbitrary command to the execsv()function, which executes the command as root behind the scenes. For example, bysending a malicious email to a specific address, the attacker may be able toforce the system to download additional malware, create a new user, or uploadsensitive system information to an internet-accessible server owned andoperated by the attacker.

The severity of any vulnerability is directly related to its exploitability. For complex bugs that require significant time and resources to develop a working exploit, the risk is considered lower than for those vulnerabilities where a fully functional exploit is available. The mechanism required to exploit the Exim flaw has been deemed “trivial”, and is therefore easily exploitable by unsophisticated attackers. In fact, a full functional exploit has been developed and released to Exploit-DB.com, a popular online repository of exploit code.

Here at OCD Tech, we conducted some simple analysis to identify just how many vulnerable systems might exist on the internet. A search was conducted using the Shodan search engine which revealed that approximately 4 million systems around the world are running vulnerable versions of Exim. If you are running Exim on any of your systems, we would strongly suggest upgrading to version 4.92 as soon as possible, as it is only a matter of time before widespread exploitation of this critical vulnerability begins.

[wpforms id="10103" title="false" description="false"]

Audit. Security. Assurance.

IT Audit | Cybersecurity | IT Assurance | IT Security Consultants – OCD Tech is a technology consulting firm serving the IT security and consulting needs of businesses in Boston (MA), Braintree (MA) and across New England. We primarily serve Fortune 500 companies including auto dealers, financial institutions, higher education, government contractors, and not-for-profit organizations with SOC 2 reporting, CMMC readiness, IT Security Audits, Penetration Testing and Vulnerability Assessments. We also provide dark web monitoring, DFARS compliance, and IT general controls review.

Contact Info

OCD Tech

25 BHOP, Suite 407, Braintree MA, 02184

844-623-8324

https://ocd-tech.com

Follow Us

Videos

Check Out the Latest Videos From OCD Tech!

Services

SOC Reporting Services
SOC 2 ® Readiness Assessment
SOC 2 ®
SOC 3 ®
SOC for Cybersecurity ®
IT Advisory Services
IT Vulnerability Assessment
Penetration Testing
Privileged Access Management
Social Engineering
WISP
General IT Controls Review
IT Government Compliance Services
CMMC
DFARS Compliance
FTC Safeguards vCISO

Industries

Financial Services
Government
Enterprise
Auto Dealerships

Critical Vulnerability In Exim Email Servers

By  
OCD Tech
June 13, 2019
5
min read
Share this post

A critical remotecommand execution vulnerability was recently identified within Exim, the UNIXbased mail transfer agent. The vulnerability, tracked as CVE-2019-10149, affectsExim versions 4.87 through 4.91, and there is no patch as of today for theseolder versions. The latest version of Exim released February 10, 2019, Exim4.92, is not affected by this vulnerability.

The exploitation of CVE-2019-10149 allows for an attacker to execute commands with full administrative permissions on the target systems. This is due to the fact that the Exim mail transfer agent runs with root level privileges. This means that an attacker that successfully exploits this vulnerability could install additional malicious software; view, change, or delete data; or create backdoor user accounts with full administrative privileges.

Thevulnerability may be exploited by sending a specially crafted email message toa specific email address on a system’s localhost. A flaw was discovered in theway that Exim parses the email data, and this flaw can be leveraged in such away that allows the attacker to pass an arbitrary command to the execsv()function, which executes the command as root behind the scenes. For example, bysending a malicious email to a specific address, the attacker may be able toforce the system to download additional malware, create a new user, or uploadsensitive system information to an internet-accessible server owned andoperated by the attacker.

The severity of any vulnerability is directly related to its exploitability. For complex bugs that require significant time and resources to develop a working exploit, the risk is considered lower than for those vulnerabilities where a fully functional exploit is available. The mechanism required to exploit the Exim flaw has been deemed “trivial”, and is therefore easily exploitable by unsophisticated attackers. In fact, a full functional exploit has been developed and released to Exploit-DB.com, a popular online repository of exploit code.

Here at OCD Tech, we conducted some simple analysis to identify just how many vulnerable systems might exist on the internet. A search was conducted using the Shodan search engine which revealed that approximately 4 million systems around the world are running vulnerable versions of Exim. If you are running Exim on any of your systems, we would strongly suggest upgrading to version 4.92 as soon as possible, as it is only a matter of time before widespread exploitation of this critical vulnerability begins.

[wpforms id="10103" title="false" description="false"]

Share this post
OCD Tech