← Back to all briefings
Cybersecurity 5 min read Published Updated Credibility 40/100

Cybersecurity Briefing — NSA warns of Exim CVE-2019-10149 exploitation

The NSA cautioned on May 28, 2020 that Russian actors were exploiting Exim mail servers via CVE-2019-10149, urging immediate upgrades to patched versions and audits for unauthorized users or scheduled tasks.

Timeline plotting source publication cadence sized by credibility.
1 publication timestamps supporting this briefing. Source data (JSON)

Executive briefing: The National Security Agency warned on that state-sponsored actors were exploiting CVE-2019-10149 in Exim mail transfer agents. Unpatched servers allow remote code execution via malicious RCPT commands, letting attackers create users, deploy malware, or pivot deeper into networks.

What changed

  • NSA observed weaponization of the flaw to gain root-level access on Exim versions 4.87–4.91, which had shipped widely in Linux distributions.
  • Patches released in Exim 4.92 and 4.92.2 fully address the vulnerability and must be applied even on internet-facing relays with limited functionality.
  • Post-compromise activity included creating unauthorized accounts, modifying sshd configuration, and establishing cron jobs for persistence.

Why it matters

  • Mail transfer agents are high-value perimeter assets; remote code execution on Exim can expose credentials, forward sensitive mail, or provide a beachhead into internal networks.
  • Organizations relying on vendor appliances or managed services may not realize they ship Exim, making asset discovery essential.
  • State-linked exploitation increases the likelihood of follow-on ransomware or espionage operations if systems remain unpatched.

Action items for operators

  • Upgrade Exim to 4.92.2 or later immediately and verify package repositories or appliance firmware incorporate the fix.
  • Audit mail gateways for new accounts, modified sshd settings, unauthorized sudoers entries, and cron tasks created after June 2019.
  • Harden MTAs by limiting exposure to necessary interfaces, enforcing authentication where possible, and monitoring for suspicious RCPT or mail-from patterns.
Timeline plotting source publication cadence sized by credibility.
1 publication timestamps supporting this briefing. Source data (JSON)
Horizontal bar chart of credibility scores per cited source.
Credibility scores for every source cited in this briefing. Source data (JSON)

Continue in the Cybersecurity pillar

Return to the hub for curated research and deep-dive guides.

Visit pillar hub

Latest guides

  • Email security
  • Vulnerability management
  • Patch management
  • Threat intelligence
Back to curated briefings