SmarterTools patches critical SmarterMail flaw allowing code execution
好的,我现在需要帮用户总结一篇文章,控制在100字以内。用户的要求是直接写文章描述,不需要以“文章内容总结”或“这篇文章”开头。 首先,我仔细阅读了文章内容。文章主要讲SmarterTools修复了SmarterMail软件中的两个关键漏洞,分别是CVE-2026-24423和CVE-2026-23760。这两个漏洞都属于严重级别,CVSS评分都是9.3分。第一个漏洞允许未认证的攻击者执行任意代码,第二个漏洞则可能导致管理员账户被劫持,进而实现远程代码执行。 接下来,我需要提取关键信息:修复的版本是Build 9511,漏洞影响范围大,有超过6000个服务器暴露在互联网上,并且已经被积极利用。此外,CISA已经将其中一个漏洞加入KeV目录,并要求相关机构在指定日期前修复。 现在,我需要将这些信息浓缩到100字以内。重点包括:修复了两个严重漏洞、版本号、漏洞影响、修复措施以及影响范围。 最后,组织语言确保简洁明了,避免使用复杂术语。确保涵盖所有关键点:漏洞名称、CVSS评分、影响、修复版本以及影响范围。 </think> SmarterTools修复了SmarterMail中的两个严重漏洞(CVE-2026-24423和CVE-2026-23760),分别允许未认证攻击者执行任意代码或劫持管理员账户。超过6,000个服务器受影响,修复版本为Build 9511。 2026-1-30 11:53:24 Author: securityaffairs.com(查看原文) 阅读量:0 收藏

SmarterTools patches critical SmarterMail flaw allowing code execution

SmarterTools fixed two SmarterMail flaws, including a critical bug (CVE-2026-24423) that could allow arbitrary code execution.

SmarterTools fixed two security bugs in its SmarterMail email software, including a critical vulnerability, tracked as CVE-2026-24423 (CVSS score of 9.3) that could let attackers run malicious code on affected systems.

“SmarterTools SmarterMail versions prior to build 9511 contain an unauthenticated remote code execution vulnerability in the ConnectToHub API method.” reads the advisory. “The attacker could point the SmarterMail to the malicious HTTP server, which serves the malicious OS command. This command will be executed by the vulnerable application.”

The researchers Sina Kheirkhah & Piotr Bazydlo of watchTowr, Markus Wulftange of CODE WHITE GmbH, and Cale Black of VulnCheck reported the vulnerability.

SmarterTools addressed the issue in version Build 9511.

SmarterTools also addressed the critical vulnerability CVE-2026-23760 (CVSS score: 9.3), which is actively exploited in the wild. An unauthenticated attacker can exploit the flaw to hijack administrator accounts and achieve remote code execution on the target, potentially leading to a full takeover of vulnerable servers.

This week, nonprofit security organization Shadowserver reported that over 6,000 SmarterMail servers are exposed on the internet and likely vulnerable to attacks exploiting CVE-2026-23760. Cybersecurity firm watchTowr disclosed the vulnerability on January 8, and SmarterTools addressed it on January 15, without assigning a CVE.

“SmarterTools SmarterMail versions prior to build 9511 contain an authentication bypass vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts.” reads the advisory. “An unauthenticated attacker can supply a target administrator username and a new password to reset the account, resulting in full administrative compromise of the SmarterMail instance.”

watchTowr researchers released a proof-of-concept exploit that only needs the admin username.

Shadowserver reported that over 6,000 SmarterMail servers are likely vulnerable, based on their version check. The researchers also observed exploitation attempts in attacks in the wild.

This week, CISA added CVE-2026-23760 to its KeV catalog, ordering FCEB agencies to address the identified vulnerability by February 16, 2026.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, CVE-2026-24423)




文章来源: https://securityaffairs.com/187496/security/smartertools-patches-critical-smartermail-flaw-allowing-code-execution.html
如有侵权请联系:admin#unsafe.sh