Sunday, March 9, 2025
HomeCVE/vulnerabilityVulnerability in Exim Mail Server Let Hackers Gain Root Access Remotely From...

Vulnerability in Exim Mail Server Let Hackers Gain Root Access Remotely From 5 Million Email Servers

Published on

SIEM as a Service

Follow Us on Google News

A Vulnerability resides in the Exim mail server allows both local and remote attacker to execute the arbitrary code and exploit the system to gain root access.

Exim is a mail transfer agent (MTA) developed by the University of Cambridge as an open-source project and is responsible for receiving, routing and delivering e-mail messages used on Unix-like operating systems. 

Last June, RCE Vulnerability in Millions of Exim Email Server, allowed attackers to Execute Arbitrary Command & Control the Server Remotely

Exit server that accepts the TLS connections are vulnerable to execute the malicious code remotely by an attacker, and it does not depend on the TLS library, so both GnuTLS and OpenSSL are vulnerable.

In order to exploit the vulnerability, the attacker sending a SNI ending in a backslash-null sequence during the initial TLS handshake.

The remote code execution vulnerability affected all Exim mail server versions up to 4.92.1, and the vulnerability has been fixed in the new version 4.92.2.

Qualys analyzed the vulnerability and released a PoC exploit code, also the vulnerability can be tracked as CVE-2019-15846 .

Based on Shodan report, more than 5 Million Exim server is running across the internet and many of them are still unpatched.

Since the vulnerability has been patched and releases the new version, the server administrator is recommended to apply the patch immediately before cybercriminals exploit the Exim server.

You can download and build a fixed version here and GitHub.

Also read about Penetration Testing Mail Server with Email Spoofing – Exploiting Open Relay configured Public Mail Servers.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and Hacking News update

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

10 Best Penetration Testing Companies in 2025

Penetration testing companies play a vital role in strengthening the cybersecurity defenses of organizations...

Lumma Stealer Using Fake Google Meet & Windows Update Sites to Launch “Click Fix” Style Attack

Cybersecurity researchers continue to track sophisticated "Click Fix" style distribution campaigns that deliver the...

Fake BianLian Ransom Demands Sent via Physical Letters to U.S. Firms

In a novel and concerning development, multiple U.S. organizations have reported receiving suspicious physical...

Strela Stealer Malware Attack Microsoft Outlook Users for Credential Theft

The cybersecurity landscape has recently been impacted by the emergence of the Strela Stealer...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Sitecore Zero-Day Flaw Allows Remote Code Execution

A critical zero-day vulnerability in Sitecore’s enterprise content management system (CMS) has been uncovered,...

Apache Airflow Misconfigurations Leak Login Credentials to Hackers

A recent investigation into misconfigured Apache Airflow instances has uncovered critical vulnerabilities exposing login...

Critical IDOR Vulnerabilities in ZITADEL Let Hackers Modify Key Settings

Security researchers have disclosed critical Insecure Direct Object Reference (IDOR) vulnerabilities in ZITADEL’s administration interface that...