Lyrie
Active Exploitation
ACTIVELY EXPLOITED3 sources verified·1 min read
By Lyrie Threat Intelligence·1/10/2022

CVE-2019-10149 added to CISA KEV: Exim Mail Transfer Agent (MTA)

Status: ✅ Confirmed exploited in the wild

Date added: 2022-01-10

Required action: Apply updates per vendor instructions.

Due date: 2022-07-10

Why this matters

Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution.

Sources

Lyrie Verdict

Lyrie's autonomous detection layer catches active exploitation primitives at machine speed — closing the gap between disclosure and weaponization that traditional defense simply can't cover.