Skip to content

Exim's Serious Vulnerabilities Expose 4 Million Servers

Exim's widespread use puts millions of servers at risk. A high-severity bug allows arbitrary code execution. Patch now to protect your system.

In this image, we can see an advertisement contains robots and some text.
In this image, we can see an advertisement contains robots and some text.

Exim's Serious Vulnerabilities Expose 4 Million Servers

The popular mail transfer agent (MTA) Exim, widely used on Unix-like systems and pre-installed on many Linux distributions, has been found to have serious vulnerabilities. The Qualys Research Team has discovered 21 unique issues, with 10 being remotely exploitable. Users are urged to apply patches immediately.

Last year, Russian cyber actors known as the Sandworm team targeted Exim vulnerabilities. The latest discovery includes a high-severity use-after-free bug (CVE-2020-28007), found and responsibly disclosed by the Zero Day Initiative (ZDI) in May 2021. This issue can lead to arbitrary code execution. Exim has since released an update (version 4.94) to address this and other vulnerabilities.

The Qualys team confirmed these issues, developed exploits, and coordinated with Exim developers and open-source distributions for responsible disclosure. Some vulnerabilities can be chained together for full remote unauthenticated code execution and root privilege gain. With an estimated 60% of internet servers running on Exim, nearly 4 million servers are exposed, highlighting the urgent need for patching.

Exim has released a security update addressing multiple vulnerabilities in versions prior to 4.94.2. Successful exploitation allows remote attackers to gain full root privileges and execute commands. Users are advised to apply these patches immediately to protect their systems.

Read also:

Latest