Thursday, April 17, 2025
HomeCVE/vulnerabilityVulnerability in Exim Mail Server Let Hackers Gain Root Access Remotely From...

Vulnerability in Exim Mail Server Let Hackers Gain Root Access Remotely From 5 Million Email Servers

Published on

SIEM as a Service

Follow Us on Google News

A Vulnerability resides in the Exim mail server allows both local and remote attacker to execute the arbitrary code and exploit the system to gain root access.

Exim is a mail transfer agent (MTA) developed by the University of Cambridge as an open-source project and is responsible for receiving, routing and delivering e-mail messages used on Unix-like operating systems. 

Last June, RCE Vulnerability in Millions of Exim Email Server, allowed attackers to Execute Arbitrary Command & Control the Server Remotely

- Advertisement - Google News

Exit server that accepts the TLS connections are vulnerable to execute the malicious code remotely by an attacker, and it does not depend on the TLS library, so both GnuTLS and OpenSSL are vulnerable.

In order to exploit the vulnerability, the attacker sending a SNI ending in a backslash-null sequence during the initial TLS handshake.

The remote code execution vulnerability affected all Exim mail server versions up to 4.92.1, and the vulnerability has been fixed in the new version 4.92.2.

Qualys analyzed the vulnerability and released a PoC exploit code, also the vulnerability can be tracked as CVE-2019-15846 .

Based on Shodan report, more than 5 Million Exim server is running across the internet and many of them are still unpatched.

Since the vulnerability has been patched and releases the new version, the server administrator is recommended to apply the patch immediately before cybercriminals exploit the Exim server.

You can download and build a fixed version here and GitHub.

Also read about Penetration Testing Mail Server with Email Spoofing – Exploiting Open Relay configured Public Mail Servers.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and Hacking News update

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Managing Burnout in the SOC – What CISOs Can Do

The Security Operations Center (SOC) is the nerve center of modern cybersecurity, responsible for...

The Future of Cybersecurity Talent – Trends and Opportunities

The cybersecurity landscape is transforming rapidly, driven by evolving threats, technological advancements, and a...

Mobile Security – Emerging Risks in the BYOD Era

The rise of Bring Your Own Device (BYOD) policies has revolutionized workplace flexibility, enabling...

Model Context Protocol Flaw Allows Attackers to Compromise Victim Systems

A critical vulnerability in the widely adopted Model Context Protocol (MCP), an open standard...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Critical Erlang/OTP SSH Vulnerability Allow Hackers Execute Arbitrary Code Remotely

A major security flaw has been uncovered in the widely used Erlang/OTP SSH implementation,...

CISA Warns of Potential Credential Exploits Linked to Oracle Cloud Hack

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a public warning following reports...

Critical Flaw in PHP’s extract() Function Enables Arbitrary Code Execution

A critical vulnerability in PHP’s extract() function has been uncovered, enabling attackers to execute arbitrary code...