LAST UPDATED: 2021-05-19
This report contains a list of vulnerable SMTP servers found by our daily IPv4 full Internet scans.
As of 2021-05-19 it contains a list of vulnerable Exim servers found through our scans, based on vulnerable Exim version information as provided in Qualys Security Advisory 21Nails: Multiple vulnerabilities in Exim.
Please note in the future it will be expanded with additional vulnerabilities, which may be non-Exim.
This scan contains information on services with the following Exim vulnerabilities:
- 21nails – the vulnerability set uncovered by Qualys
- CVE-2020-28020 (unauthenticated RCE as “exim”, in Exim < 4.92), also covered by the 21nails Qualys advisory but distinctly tagged.
Please note: The above information is based on banner version information collected during the SMTP scan, hence there is a possibility of False Positive reports. If you believe a report is a False Positive, please let us know along with the details of the SMTP server/patch in question.
The report excludes Ubuntu Exim versions >= 4.82 and Debian Exim versions >= 4.89 as it is not possible to determine based on the banner whether the following patches below have been applied:
The following tables shows example mappings that are applied (aside from Ubuntu Exim versions >= 4.82 and Debian Exim versions >= 4.89):
|ESMTP Exim 4.94.2||smtp|
|ESMTP Exim 4.94.0||smtp;21nails|
|ESMTP Exim 4.92||smtp;21nails|
|ESMTP Exim 4.91||smtp;cve-2020-28020|
Please note vulnerable Microsoft Exchange servers are reported out in a separate Vulnerable Exchange Server report.
For more information on our scanning efforts, check out our Internet scanning summary page.