{"id":2540,"date":"2026-05-13T09:03:32","date_gmt":"2026-05-13T16:03:32","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=2540"},"modified":"2026-05-13T09:03:33","modified_gmt":"2026-05-13T16:03:33","slug":"emerging-threat-cve-2026-45185-exim-remote-code-execution-via-bdat-over-gnutls","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-45185-exim-remote-code-execution-via-bdat-over-gnutls\/","title":{"rendered":"Emerging Threat: (CVE-2026-45185) Exim Remote Code Execution via BDAT over GnuTLS"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"569\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-172-1280x569.png\" alt=\"\" class=\"wp-image-2542\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-172-1280x569.png 1280w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-172-512x228.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-172-768x341.png 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-172-1536x683.png 1536w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-172-2048x910.png 2048w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><figcaption class=\"wp-element-caption\"><em>Sample of assets impacted by Exim Dead.Letter vulnerability, identified by the CyCognito Platform<\/em><\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">What is CVE-2026-45185?<\/h2>\n\n\n\n<p>CVE-2026-45185, nicknamed Dead.Letter, is a use-after-free vulnerability in the BDAT message body parsing path of Exim, the open-source Mail Transfer Agent that runs a large share of the internet&#8217;s email servers. The flaw lives in the GnuTLS-backed TLS path, where Exim can free its internal transfer buffer during a TLS shutdown while the SMTP state machine still holds a reference to it. A final byte sent in cleartext on the same TCP connection after a TLS <code>close_notify<\/code> causes Exim to write into that freed memory, corrupting the heap.<\/p>\n\n\n\n<p>The vulnerability carries a CVSS v3.1 base score of 9.8 (Critical). Exploitation is unauthenticated and requires no user interaction. The attacker needs only the ability to open a TLS connection to the server and use the standard <code>CHUNKING<\/code> (BDAT) SMTP extension, both of which are enabled by default on most internet-facing Exim deployments.<\/p>\n\n\n\n<p>An unauthenticated network attacker who successfully exploits the flaw can execute arbitrary code in the context of the Exim process, which on most distributions runs with elevated privileges to bind port 25 and read mail spool directories.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What assets are affected by CVE-2026-45185?<\/h2>\n\n\n\n<p>The flaw affects Exim versions 4.97 through 4.99.2 when compiled with <code>USE_GNUTLS=yes<\/code>. Builds linked against OpenSSL or other TLS libraries are not vulnerable to this specific path, which means exposure is concentrated on Debian, Ubuntu, and Debian-derived distributions that ship GnuTLS-backed Exim packages by default. Red Hat Enterprise Linux and SUSE-family systems generally ship OpenSSL-linked builds and are out of scope.<\/p>\n\n\n\n<p>In practice, an affected asset is an internet-facing SMTP server on TCP\/25, TCP\/465, or TCP\/587 that advertises both <code>STARTTLS<\/code> and <code>CHUNKING<\/code> in its EHLO response. Exim is the default MTA on Debian and a common choice for shared hosting providers, university mail systems, small-to-mid-size ISPs, transactional mail relays, and legacy on-premise mail infrastructure. Many of these systems are long-running, lightly managed, and exposed to the entire internet by design.<\/p>\n\n\n\n<p>Debian published DSA-6265-1 on the same day as the upstream advisory, with fixed packages for oldoldstable, oldstable, and stable. Ubuntu released coordinated updates for supported releases including 24.04 LTS. Operators should not assume their distribution has shipped a fixed package until verified directly against the relevant security tracker.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What does our data show about exposure patterns?<\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"777\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-171-1280x777.png\" alt=\"\" class=\"wp-image-2541\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-171-1280x777.png 1280w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-171-512x311.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-171-768x466.png 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-171.png 1335w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/figure>\n\n\n\n<p>Exposure in this set is led by Consumer Discretionary at 24.2% of observed assets, with Industrials contributing 16.9% and Communication Services 12.9%. The remaining 46.1% is spread thinly across Consumer Staples, Health Care, Energy, Financials, Information Technology, Materials, Utilities, and a meaningful tail of unclassified or mixed-portfolio organizations.<\/p>\n\n\n\n<p>Consumer Discretionary&#8217;s lead is consistent with how Exim tends to enter an estate. Retail, hospitality, media, and online services accumulate marketing platforms, regional subsidiaries, white-label storefronts, and acquired brands, each of which often brings its own transactional mail relay. <\/p>\n\n\n\n<p>Those relays are frequently provisioned by hosting providers using Debian or Ubuntu defaults, which means GnuTLS-backed Exim quietly becomes the SMTP layer for properties the parent organization never directly inventoried.<\/p>\n\n\n\n<p>The broader cross-sector spread reflects what makes mail infrastructure so persistent on the external attack surface. SMTP servers rarely get decommissioned cleanly. A relay set up for a campaign, a partner integration, or a legacy ticketing system stays reachable on TCP\/25 long after the function it served has been retired, and the team that originally configured it has moved on. Dead.Letter is dangerous precisely because it lives in the part of the estate organizations are least likely to be actively watching.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Are fixes available?<\/h2>\n\n\n\n<p>Yes. Exim 4.99.3 was released on May 12, 2026, and is the canonical fix. The patch resets the input processing stack when a TLS <code>close_notify<\/code> is received during an active BDAT transfer, eliminating the stale pointer that the previous code path could write into. Operators building Exim from source should move to 4.99.3 or later.<\/p>\n\n\n\n<p>For distribution-packaged installs, Debian shipped fixed exim4 packages for stable (<code>4.98.2-1+deb13u2<\/code>), oldstable (<code>4.96-15+deb12u9<\/code>), and oldoldstable (<code>4.94.2-7+deb11u5<\/code>) on May 12, 2026. Ubuntu published coordinated security updates for supported releases including 24.04 LTS. Other Debian-derived distributions are rolling fixes through their own pipelines on varying schedules.<\/p>\n\n\n\n<p>The Exim advisory and the upstream oss-security thread both state that no effective configuration-based workaround exists. Disabling <code>CHUNKING<\/code> is not a supported mitigation path, and disabling TLS removes the GnuTLS code path but creates a much worse security posture. <\/p>\n\n\n\n<p>Defenders should treat the version upgrade or distribution patch as the only viable remediation and verify the installed binary is linked against the patched code, not just that the package version string has changed.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Are there any other recommended actions to take?<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Upgrade Exim to 4.99.3 or apply the distribution security update, then restart the service. <\/li>\n\n\n\n<li>Confirm the running binary is linked against the patched code, since the package version alone is not proof. <\/li>\n\n\n\n<li>Where patching is blocked, rebuild Exim against OpenSSL instead of GnuTLS to remove the vulnerable code path. <\/li>\n\n\n\n<li>Restrict TCP\/25, TCP\/465, and TCP\/587 to known relay peers on mail servers that do not need to accept public SMTP.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">How can CyCognito help your organization?<\/h2>\n\n\n\n<p>CyCognito published an Emerging Threat Advisory for CVE-2026-45185 in the CyCognito platform and is actively researching enhanced detection capabilities for this vulnerability.<\/p>\n\n\n\n<p>To learn how CyCognito can help your organization reduce external exposure and manage emerging threats more effectively, <a href=\"https:\/\/www.cycognito.com\/demo\/\">contact us to request a demo<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A critical use-after-free vulnerability in Exim&#8217;s BDAT message body parsing path, allows an unauthenticated network attacker to execute arbitrary code on the underlying mail server.<\/p>\n","protected":false},"author":39,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-2540","post","type-post","status-publish","format-standard","hentry","category-research"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Emerging Threat: (CVE-2026-45185) Exim Remote Code Execution via BDAT over GnuTLS | CyCognito Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-45185-exim-remote-code-execution-via-bdat-over-gnutls\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Emerging Threat: (CVE-2026-45185) Exim Remote Code Execution via BDAT over GnuTLS | CyCognito Blog\" \/>\n<meta property=\"og:description\" content=\"A critical use-after-free vulnerability in Exim&#039;s BDAT message body parsing path, allows an unauthenticated network attacker to execute arbitrary code on the underlying mail server.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-45185-exim-remote-code-execution-via-bdat-over-gnutls\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-13T16:03:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-13T16:03:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-172.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2786\" \/>\n\t<meta property=\"og:image:height\" content=\"1238\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Igal Zeifman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Igal Zeifman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-45185-exim-remote-code-execution-via-bdat-over-gnutls\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-45185-exim-remote-code-execution-via-bdat-over-gnutls\/\"},\"author\":{\"name\":\"Igal Zeifman\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/79ab10bc35a38aef399f5bbd21d8f1b3\"},\"headline\":\"Emerging Threat: (CVE-2026-45185) Exim Remote Code Execution via BDAT over GnuTLS\",\"datePublished\":\"2026-05-13T16:03:32+00:00\",\"dateModified\":\"2026-05-13T16:03:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-45185-exim-remote-code-execution-via-bdat-over-gnutls\/\"},\"wordCount\":882,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-45185-exim-remote-code-execution-via-bdat-over-gnutls\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-172-1280x569.png\",\"articleSection\":[\"Research\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-45185-exim-remote-code-execution-via-bdat-over-gnutls\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-45185-exim-remote-code-execution-via-bdat-over-gnutls\/\",\"name\":\"Emerging Threat: (CVE-2026-45185) Exim Remote Code Execution via BDAT over GnuTLS | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-45185-exim-remote-code-execution-via-bdat-over-gnutls\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-45185-exim-remote-code-execution-via-bdat-over-gnutls\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-172-1280x569.png\",\"datePublished\":\"2026-05-13T16:03:32+00:00\",\"dateModified\":\"2026-05-13T16:03:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-45185-exim-remote-code-execution-via-bdat-over-gnutls\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-45185-exim-remote-code-execution-via-bdat-over-gnutls\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-45185-exim-remote-code-execution-via-bdat-over-gnutls\/#primaryimage\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-172.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-172.png\",\"width\":2786,\"height\":1238},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-45185-exim-remote-code-execution-via-bdat-over-gnutls\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Emerging Threat: (CVE-2026-45185) Exim Remote Code Execution via BDAT over GnuTLS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/79ab10bc35a38aef399f5bbd21d8f1b3\",\"name\":\"Igal Zeifman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b4495bcfbe7465d573c6f7ee3e2a3cab?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b4495bcfbe7465d573c6f7ee3e2a3cab?s=96&d=mm&r=g\",\"caption\":\"Igal Zeifman\"},\"description\":\"VP of Marketing\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/igal-zeifman\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Emerging Threat: (CVE-2026-45185) Exim Remote Code Execution via BDAT over GnuTLS | CyCognito Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-45185-exim-remote-code-execution-via-bdat-over-gnutls\/","og_locale":"en_US","og_type":"article","og_title":"Emerging Threat: (CVE-2026-45185) Exim Remote Code Execution via BDAT over GnuTLS | CyCognito Blog","og_description":"A critical use-after-free vulnerability in Exim's BDAT message body parsing path, allows an unauthenticated network attacker to execute arbitrary code on the underlying mail server.","og_url":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-45185-exim-remote-code-execution-via-bdat-over-gnutls\/","og_site_name":"CyCognito Blog","article_published_time":"2026-05-13T16:03:32+00:00","article_modified_time":"2026-05-13T16:03:33+00:00","og_image":[{"width":2786,"height":1238,"url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-172.png","type":"image\/png"}],"author":"Igal Zeifman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Igal Zeifman","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-45185-exim-remote-code-execution-via-bdat-over-gnutls\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-45185-exim-remote-code-execution-via-bdat-over-gnutls\/"},"author":{"name":"Igal Zeifman","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/79ab10bc35a38aef399f5bbd21d8f1b3"},"headline":"Emerging Threat: (CVE-2026-45185) Exim Remote Code Execution via BDAT over GnuTLS","datePublished":"2026-05-13T16:03:32+00:00","dateModified":"2026-05-13T16:03:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-45185-exim-remote-code-execution-via-bdat-over-gnutls\/"},"wordCount":882,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-45185-exim-remote-code-execution-via-bdat-over-gnutls\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-172-1280x569.png","articleSection":["Research"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-45185-exim-remote-code-execution-via-bdat-over-gnutls\/","url":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-45185-exim-remote-code-execution-via-bdat-over-gnutls\/","name":"Emerging Threat: (CVE-2026-45185) Exim Remote Code Execution via BDAT over GnuTLS | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-45185-exim-remote-code-execution-via-bdat-over-gnutls\/#primaryimage"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-45185-exim-remote-code-execution-via-bdat-over-gnutls\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-172-1280x569.png","datePublished":"2026-05-13T16:03:32+00:00","dateModified":"2026-05-13T16:03:33+00:00","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-45185-exim-remote-code-execution-via-bdat-over-gnutls\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-45185-exim-remote-code-execution-via-bdat-over-gnutls\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-45185-exim-remote-code-execution-via-bdat-over-gnutls\/#primaryimage","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-172.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-172.png","width":2786,"height":1238},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-45185-exim-remote-code-execution-via-bdat-over-gnutls\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Emerging Threat: (CVE-2026-45185) Exim Remote Code Execution via BDAT over GnuTLS"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/79ab10bc35a38aef399f5bbd21d8f1b3","name":"Igal Zeifman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b4495bcfbe7465d573c6f7ee3e2a3cab?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b4495bcfbe7465d573c6f7ee3e2a3cab?s=96&d=mm&r=g","caption":"Igal Zeifman"},"description":"VP of Marketing","url":"https:\/\/www.cycognito.com\/blog\/author\/igal-zeifman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/2540","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=2540"}],"version-history":[{"count":1,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/2540\/revisions"}],"predecessor-version":[{"id":2543,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/2540\/revisions\/2543"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=2540"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=2540"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=2540"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}