A critical remote code execution (RCE) vulnerability in SmarterTools SmarterMail is being actively exploited, with over 6,000 servers exposed online. This flaw poses a severe risk to organizations relying on SmarterMail for enterprise email operations.
Vulnerability Overview
- CVE ID: CVE-2026-23760
- Severity: CVSS 9.3 (Critical)
- Affected versions: All builds prior to 9511 (patched Jan 15, 2026).
- Component: Password reset API (
/api/v1/auth/force-reset-password). - Flaw: Allows unauthenticated requests to reset administrator passwords without verification or reset tokens.
- Impact:
- Immediate administrator account takeover.
- Admins can execute OS-level commands via SmarterMail Settings → SYSTEM-level compromise.
Active Exploitation
- Exploitation observed since Jan 17, 2026 (two days after patch release).
- Huntress Labs: Attackers created malicious System Events to run reconnaissance commands.
- Watchtowr Labs: Confirmed exploitation in production environments.
- Shadowserver scans: Over 6,000 vulnerable IPs across multiple continents.
- Attackers are monitoring release notes and performing patch diffing to reverse-engineer vulnerabilities quickly.
Attack Chain
- Exploit password reset API → set new admin password.
- Obtain authentication tokens.
- Use admin privileges to execute OS commands.
- Deploy persistent backdoors or web shells.
- Conduct reconnaissance and lateral movement.
Defensive Recommendations
- Patch immediately: Upgrade to Build 9511 or later.
- Log review: Check for unauthorized password resets in admin activity logs.
- Threat hunting: Investigate for web shells, malware, or malicious System Events.
- Backup validation: Ensure backups are uncompromised and offline copies exist.
- Monitoring: Watch for suspicious authentication tokens and persistence mechanisms.
Takeaway
This vulnerability highlights the extreme risk of exposed email infrastructure. With 6,000+ servers still unpatched, attackers are actively exploiting CVE-2026-23760 to gain SYSTEM-level access. Organizations must patch immediately, audit admin activity, and harden SmarterMail deployments to prevent compromise.
Leave a Reply