A critical security vulnerability identified in Exim MTA, tracked as CVE-2025-30232, affects versions 4.96 to 4.98.1 and allows for potential privilege escalation due to a use-after-free (UAF) issue. Command-line access is required for exploitation, posing a high risk for organisations using Exim, particularly those running Debian-based systems. The vulnerability's presence in popular systems like Ubuntu 24.04 LTS and Debian Bookworm, coupled with Exim's extensive use globally, puts a vast number of servers at risk. The issue has been addressed in Exim 4.98.2, but until systems are patched, they remain vulnerable to data breaches and system compromise.
Source: https://cybersecuritynews.com/exim-use-after-free-vulnerability/
"id": "exi812032725",
"linkid": "exim-finance",
"type": "Vulnerability",
"date": "3/2025",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization’s existence"