HomeVulnerabilitySmarterMail Fixes Important Unauthenticated RCE Flaw with CVSS 9.3 Rating

SmarterMail Fixes Important Unauthenticated RCE Flaw with CVSS 9.3 Rating

SmarterTools has addressed two extra security flaws in SmarterMail e mail software program, together with one important security flaw that might end in arbitrary code execution.

The vulnerability, tracked as CVE-2026-24423, carries a CVSS rating of 9.3 out of 10.0.

“SmarterTools SmarterMail variations prior to construct 9511 comprise an unauthenticated distant code execution vulnerability within the ConnectToHub API technique,” in line with an outline of the flaw in CVE.org.

“The attacker may level the SmarterMail to the malicious HTTP server, which serves the malicious OS [operating system] command. This command will likely be executed by the weak utility.”

watchTowr researchers Sina Kheirkhah and Piotr Bazydlo, CODE WHITE GmbH’s Markus Wulftange, and VulnCheck’s Cale Black have been credited with discovering and reporting the vulnerability.

The security gap has been addressed in model Construct 9511, launched on January 15, 2026. The identical construct additionally patches one other important flaw (CVE-2026-23760, CVSS rating: 9.3) that has since come beneath lively exploitation within the wild.

Cybersecurity

As well as, SmarterTools has shipped fixes to plug a medium-severity security vulnerability (CVE-2026-25067, CVSS rating: 6.9) that might enable an attacker to facilitate NTLM relay assaults and unauthorized community authentication.

See also  Amazon has stopped 1,800 job purposes from North Korean brokers

It has been described as a case of unauthenticated path coercion affecting the background-of-the-day preview endpoint.

“The appliance base64-decodes attacker-supplied enter and makes use of it as a filesystem path with out validation,” VulnCheck famous in an alert.

“On Home windows programs, this permits UNC [Universal Naming Convention] paths to be resolved, inflicting the SmarterMail service to provoke outbound SMB authentication makes an attempt to attacker-controlled hosts. This may be abused for credential coercion, NTLM relay assaults, and unauthorized community authentication.”

The vulnerability has been patched in Construct 9518, launched on January 22, 2026. With two vulnerabilities in SmarterMail coming beneath lively exploitation over the previous week, it is important that customers replace to the most recent model as quickly as attainable.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular