DESCRIPTION LAST UPDATED: 2024-01-01
DEFAULT SEVERITY LEVEL: CRITICAL
This report contains a list of vulnerable SMTP servers found by our daily IPv4 full Internet scans and hitlist IPv6 scans.
As of 2021-05-19 it contains a list of vulnerable Exim servers found through our scans, based on vulnerable Exim version information as provided in Qualys Security Advisory 21Nails: Multiple vulnerabilities in Exim.
Please note in the future it will be expanded with additional vulnerabilities, which may be non-Exim.
This scan contains information on services with the following Exim vulnerabilities:
- 21nails – the vulnerability set uncovered by Qualys
- CVE-2020-28020 (unauthenticated RCE as “exim”, in Exim < 4.92), also covered by the 21nails Qualys advisory but distinctly tagged.
Please note: The above information is based on banner version information collected during the SMTP scan, hence there is a possibility of False Positive reports. If you believe a report is a False Positive, please let us know along with the details of the SMTP server/patch in question.
The report excludes Ubuntu Exim versions >= 4.82 and Debian Exim versions >= 4.89 as it is not possible to determine based on the banner whether the following patches below have been applied:
The following tables shows example mappings that are applied (aside from Ubuntu Exim versions >= 4.82 and Debian Exim versions >= 4.89):
Banner | Tag |
---|---|
ESMTP Exim 4.94.2 | smtp |
ESMTP Exim 4.94.0 | smtp;21nails |
ESMTP Exim 4.92 | smtp;21nails |
ESMTP Exim 4.91 | smtp;cve-2020-28020 |
Please note vulnerable Microsoft Exchange servers are reported out in a separate Vulnerable Exchange Server report.
Severity levels are described here.
For more information on our scanning efforts, check out our Internet scanning summary page.
This report comes in 2 versions, IPv4 and IPv6.
Filenames: scan_smtp_vulnerable, scan6_smtp_vulnerable