INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Information Technology HIGH 1h Global data_breach Government CRITICAL 10h Global ransomware Financial Services / Cybersecurity CRITICAL 11h Global vulnerability Information Technology / Cybersecurity CRITICAL 13h Global malware Energy and Utilities CRITICAL 14h Global ransomware Multiple sectors CRITICAL 14h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 16h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 17h Global phishing Multiple sectors HIGH 17h Global insider Cybersecurity Services CRITICAL 18h Global vulnerability Information Technology HIGH 1h Global data_breach Government CRITICAL 10h Global ransomware Financial Services / Cybersecurity CRITICAL 11h Global vulnerability Information Technology / Cybersecurity CRITICAL 13h Global malware Energy and Utilities CRITICAL 14h Global ransomware Multiple sectors CRITICAL 14h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 16h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 17h Global phishing Multiple sectors HIGH 17h Global insider Cybersecurity Services CRITICAL 18h Global vulnerability Information Technology HIGH 1h Global data_breach Government CRITICAL 10h Global ransomware Financial Services / Cybersecurity CRITICAL 11h Global vulnerability Information Technology / Cybersecurity CRITICAL 13h Global malware Energy and Utilities CRITICAL 14h Global ransomware Multiple sectors CRITICAL 14h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 16h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 17h Global phishing Multiple sectors HIGH 17h Global insider Cybersecurity Services CRITICAL 18h
Vulnerabilities

CVE-2010-4345

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Exim Privilege Escalation via Alternate Configuration File Exploitation
Published: Mar 25, 2022  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Exim Privilege Escalation Vulnerability — Exim allows local users to gain privileges by leveraging the ability of the exim user account to specify an alternate configuration file with a directive that contains arbitrary commands.

🤖 AI Executive Summary

Exim mail server contains a critical privilege escalation vulnerability (CVE-2010-4345) allowing local users with exim account access to execute arbitrary commands through malicious configuration file directives. Active exploits exist with no official patch available, posing significant risk to mail infrastructure.

📄 Description (Arabic)

تسمح هذه الثغرة الأمنية الحرجة للمهاجمين المحليين الذين يمتلكون صلاحيات حساب exim باستغلال قدرة النظام على تحديد ملف تكوين بديل يحتوي على توجيهات ضارة. يمكن للمهاجم تضمين أوامر تعسفية في ملف التكوين المخصص، مما يؤدي إلى تنفيذها بصلاحيات مرتفعة عند معالجة Exim للملف. تشكل هذه الثغرة خطراً جسيماً على أنظمة البريد الإلكتروني حيث يمكن استخدامها للسيطرة الكاملة على الخادم. وجود استغلالات نشطة وعدم توفر تصحيح رسمي يزيد من حدة المخاطر الأمنية المرتبطة بهذه الثغرة.

🤖 ملخص تنفيذي (AI)

يحتوي خادم البريد Exim على ثغرة حرجة لتصعيد الصلاحيات (CVE-2010-4345) تسمح للمستخدمين المحليين الذين لديهم وصول لحساب exim بتنفيذ أوامر عشوائية من خلال توجيهات ملف تكوين ضارة. توجد استغلالات نشطة دون وجود تصحيح رسمي متاح، مما يشكل خطراً كبيراً على البنية التحتية للبريد الإلكتروني.

🤖 AI Intelligence Analysis Analyzed: Feb 28, 2026 09:11
🇸🇦 Saudi Arabia Impact Assessment
Saudi organizations using Exim mail servers face critical risk of complete system compromise through local privilege escalation. Financial institutions, government entities, and healthcare providers relying on Exim for email services are particularly vulnerable to insider threats or attackers who have gained initial foothold access.
🏢 Affected Saudi Sectors
القطاع المالي والمصرفي الجهات الحكومية قطاع الرعاية الصحية قطاع الاتصالات وتقنية المعلومات قطاع التعليم المؤسسات الكبرى والشركات
⚖️ Saudi Risk Score (AI)
9.0
/ 10.0
🔧 Remediation Steps (English)
1. Immediately migrate from Exim to alternative mail transfer agents (Postfix, Sendmail) or upgrade to latest Exim versions (4.96+ recommended) that address this vulnerability class
2. Implement strict file system permissions restricting exim user account access to configuration directories and enforce mandatory access controls (SELinux/AppArmor) to prevent unauthorized configuration file loading
3. Deploy comprehensive monitoring for suspicious exim process behavior, unauthorized configuration file modifications, and privilege escalation attempts with immediate alerting to security operations teams
🔧 خطوات المعالجة (العربية)
1. الانتقال فوراً من Exim إلى وكلاء نقل بريد بديلة (Postfix أو Sendmail) أو الترقية إلى أحدث إصدارات Exim (يُوصى بالإصدار 4.96 أو أحدث) التي تعالج فئة الثغرات هذه
2. تطبيق أذونات صارمة لنظام الملفات لتقييد وصول حساب exim إلى دلائل التكوين وفرض ضوابط الوصول الإلزامية (SELinux/AppArmor) لمنع تحميل ملفات التكوين غير المصرح بها
3. نشر مراقبة شاملة لسلوك عمليات exim المشبوهة والتعديلات غير المصرح بها على ملفات التكوين ومحاولات تصعيد الصلاحيات مع إنشاء تنبيهات فورية لفرق العمليات الأمنية
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-1-2 (Vulnerability Management) ECC-3-1 (System Hardening) ECC-4-1 (Security Monitoring) ECC-5-2 (Privileged Access Management)
🔵 SAMA CSF
SAMA-TRM-1.2 (Vulnerability Assessment) SAMA-TRM-2.1 (Patch Management) SAMA-IAM-3.1 (Privileged Account Management) SAMA-OPS-4.2 (Security Monitoring)
🟡 ISO 27001:2022
A.12.6.1 (Management of Technical Vulnerabilities) A.9.2.3 (Management of Privileged Access Rights) A.12.4.1 (Event Logging) A.14.2.5 (Secure System Engineering Principles)
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Exim:Exim
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS4.02%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2022-04-15
Published 2022-03-25
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
9.0
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.