Security News > 2021 > May > Critical 21Nails Exim bugs expose millions of servers to attacks

Newly discovered critical vulnerabilities in the Exim mail transfer agent software allow unauthenticated remote attackers to execute arbitrary code and gain root privilege on mail servers with default or common configurations.
All versions released before Exim 4.94.2 are vulnerable to attacks attempting to exploit the 21Nails vulnerabilities.
MTA servers such as Exim are an easy target to attacks given that, in most cases, they are reachable over the Internet and provide attackers with a simple entry point into a target's network.
According to the survey, it is installed on more than 59% out of a total of 1,084,800 mail servers reachable on the Internet, representing just over 344,026 Exim servers.
If not patched as soon as possible, all these servers could fall victim to incoming remote command execution attacks if not urgently patched against the 21Nails vulnerabilities.
All Exim users should immediately upgrade to the latest available Exim version to block any incoming attack targeting their vulnerable servers.
News URL
Related news
- Critical flaws fixed in Nagios Log Server (source)
- New BPFDoor Controller Enables Stealthy Lateral Movement in Linux Server Attacks (source)
- SAP fixes critical Netweaver flaw exploited in attacks (source)
- Hackers Exploit Critical Craft CMS Flaws; Hundreds of Servers Likely Compromised (source)
- Hitachi Vantara takes servers offline after Akira ransomware attack (source)
- Critical Langflow RCE flaw exploited to hack AI app servers (source)
- Samsung MagicINFO 9 Server RCE flaw now exploited in attacks (source)
- Apache Parquet exploit tool detect servers vulnerable to critical flaw (source)
- Chinese hackers behind attacks targeting SAP NetWeaver servers (source)
- Fortinet fixes critical zero-day exploited in FortiVoice attacks (source)