- Description
- A use-after-free in Exim 4.96 through 4.98.1 could allow users (with command-line access) to escalate privileges.
- Source
- cve@mitre.org
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Secondary
- Base score
- 8.1
- Impact score
- 6
- Exploitability score
- 1.4
- Vector string
- CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
- Severity
- HIGH
- cve@mitre.org
- CWE-416
Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.
- Hype score
1
به تازگی برای Exim که mail transfer agent لینوکسی شمی باشد ، آسیب پذیری با کد شناسایی CVE-2025-30232 منتشر شده است. این آسیب پذیری از نوع privilege escalation بوده و ورژن های 4.96, 4.97, 4.98 و 4.98.1 دارای این آسیب پذیری هستند . https://t.co/Poz3aKY03t https://t.co/eme2QhC5ar
@AmirHossein_sec
4 Apr 2025
20 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
SIOSセキュリティブログを更新しました。 eximの脆弱性(Important: CVE-2025-30232) #sios_tech #security #vulnerability #セキュリティ #脆弱性 #exim #mail #linux https://t.co/29hUXk1fQt
@omokazuki
30 Mar 2025
76 Impressions
0 Retweets
3 Likes
1 Bookmark
0 Replies
0 Quotes
Warning: High severity Use after Free vulnerability in #Exim. #CVE-2025-30232, CVSS 8.1. Do not forget to #Patch #Patch #Patch More info: https://t.co/Mx4iOlxbxz
@CCBalert
28 Mar 2025
11 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
В агенте пересылки сообщений Exim обнаружена критическая уязвимость CVE-2025-30232 (use-after-free), которая может привести к повышению привилегий на сервере. Подробнее https://t.co/gxotOXonKn https://t.co/tKaUOjueIQ
@KZCERT
28 Mar 2025
36 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Critical Exim vulnerability (CVE-2025-30232) allows privilege escalation via use-after-free flaw. Affects versions 4.96-4.98.1. Patch now to 4.98.2 - this impacts half of all mail servers worldwide. Details: https://t.co/OL8uMp20sx
@RedTeamNewsBlog
28 Mar 2025
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
A critical use-after-free vulnerability (CVE-2025-30232) in Exim can lead to privilege escalation. Affected versions (4.96-4.98.1) require prompt patching 🔒. Stay vigilant! #Exim #Unix #SecurityUSA link: https://t.co/EoMsKfPxMJ https://t.co/kMWi1wGgdw
@TweetThreatNews
27 Mar 2025
59 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-30232: Use-After-Free Vulnerability in Exim Exposes Systems to Privilege Escalation A critical flaw in Exim allows attackers to escalate privileges, compromising system security. Patch your servers immediately. https://t.co/7NLwNoFzTq #Cybersecurity #Exim
@adriananglin
27 Mar 2025
5 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️ Vulnerability Alert: Use-After-Free Vulnerability in Exim Exposes Systems to Privilege Escalation 📅 Timeline: 🆔cveId: CVE-2025-30232 📊baseScore: N/A 📏cvssMetrics: N/A cvssSeverity: Critical 🔴 📈 EPSS Percentile: 0% 🛠️exploitMaturity: Not Available 📂affectedVersions:
@syedaquib77
27 Mar 2025
11 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-30232: Use-after-free in Exim, "medium" rating❗️ Vuln in some versions of Exim potentially allows an attacker to perform Privilege Escalation, if he has CLI access. Search at https://t.co/hv7QKSqxTR: 👉 Link: https://t.co/tPb1nui1G1 #cybersecurity #vulnerability_map h
@Netlas_io
27 Mar 2025
39 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
Unix系システムで広く使われているMTA「Exim」に重大な脆弱性(CVE-2025-30232)が発見された。これはuse-after-freeに起因し、特定条件下でローカル特権昇格が可能となる。攻撃にはローカルでのコマンドラインアクセスが必要。 https://t.co/gwsUfQZ38J
@yousukezan
27 Mar 2025
895 Impressions
5 Retweets
10 Likes
2 Bookmarks
0 Replies
1 Quote
CVE-2025-30232: Use-After-Free Vulnerability in Exim Exposes Systems to Privilege Escalation Understand the critical security issues related to CVE 2025-30232 in #Exim and how it can affect #Unix systems. https://t.co/uYvM1Jqdpl
@the_yellow_fall
27 Mar 2025
204 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes