Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Attackers Reverse‑Engineer Patch to Exploit SmarterMail Admin Bypass in the Wild

Posted on January 22, 2026January 23, 2026 By CWS

A crucial authentication bypass vulnerability in SmarterTools SmarterMail is actively being exploited within the wild by attackers, in accordance with safety researchers at watchTowr Labs.

The vulnerability, tracked as WT-2026-0001, permits unauthenticated attackers to reset the system administrator password with none validation, main to finish system takeover.

The flaw exists within the ForceResetPassword API endpoint, which is designed to deal with official password reset situations.

Nevertheless, the endpoint is uncovered with out authentication and comprises a crucial design flaw: it accepts a user-controlled parameter, IsSysAdmin, that branches the code logic to totally different password reset procedures.

smartermail launch notes ( supply : watchtowr labs)

When an attacker units IsSysAdmin to “true,” the appliance makes an attempt to reset the password of an administrator account. Critically, the implementation fails to validate the present password earlier than permitting the reset.

That’s carried out for normal person accounts however mysteriously omitted for directors; this inconsistency is the guts of the vulnerability.

The assault requires solely three items of knowledge despatched through a easy HTTP POST request:

The force-reset-password endpoint implicated in WT-2026-0001 ( supply: watchtowr labs)

The administrator username (generally “admin”), a brand new password of the attacker’s selecting, and the IsSysAdmin flag. The previous password discipline is ignored totally for admin accounts.

POST /api/v1/auth/force-reset-password HTTP/1.1
Host: xxxxxxx:9998
Content material-Sort: utility/json
Content material-Size: 145

{“IsSysAdmin”:”true”,
“OldPassword”:”watever”,
“Username”:”admin”,
“NewPassword”:”NewPassword123!@#”,
“ConfirmPassword”: “NewPassword123!@#”}

Lively Exploitation Confirmed

Patch diffing, the place attackers decompile safety patches to determine and perceive vulnerabilities, performed a key function on this risk.

SmarterMail launched model 9511 on January 15, 2026, simply six days after the vulnerability was found.

Full distant code execution achieved (supply: Watchtower Labs)

Attackers analyzed the patch, reverse-engineered the vulnerability, and commenced exploitation makes an attempt inside 48 hours of the discharge.

A SmarterMail discussion board publish from January 17 confirmed that exploitation makes an attempt had already occurred within the wild.

As soon as authenticated as an administrator, attackers achieve entry to a built-in function that amplifies the affect: The flexibility to create quantity mounts with arbitrary working system instructions.

These instructions execute with SYSTEM-level privileges, offering full distant code execution on the server.

PoC reaching a SYSTEM-level shell (supply: watchtowr labs)

This two-stage assault chain, which bypasses authentication after which executes instructions by official administrative options, transforms a password reset flaw into a whole system compromise.

WatchTowr Labs advises organizations utilizing SmarterMail to improve instantly to model 9511.

The patch provides correct password validation to the administrator reset path, stopping the exploit. Delaying this replace exposes methods to lively risk actor campaigns looking for susceptible situations.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Admin, Attackers, Bypass, Exploit, Patch, ReverseEngineer, SmarterMail, Wild

Post navigation

Previous Post: Old Attack, New Speed: Researchers Optimize Page Cache Exploits
Next Post: Hackers Earned $516,500 for 37 Unique 0-day Vulnerabilities

Related Posts

Threat Actors Behind WARMCOOKIE Malware Added New Features to It’s Arsenal Cyber Security News
Threat Actors can Use Xanthorox AI Tool to Generate Different Malicious Code Based on Prompts Cyber Security News
Threat Actors Leverages DeepSeek-R1 Popularity to Attack Users Running Windows Devices Cyber Security News
11 Best Cloud Access Security Broker Software (CASB) Cyber Security News
Microsoft Sued for Allegedly Misleading Millions to Subscribe for Microsoft 365 Subscriptions Cyber Security News
New BOF Tool Exploits Microsoft Teams’ Cookie Encryption allowing Attackers to Access User Chats Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Infotainment, EV Charger Exploits Earn Hackers $1M at Pwn2Own Automotive 2026
  • New Windows Notepad and Paint Update Brings More Useful AI Features
  • Fresh SmarterMail Flaw Exploited for Admin Access
  • 2 Venezuelans Convicted in US for Using Malware to Hack ATMs
  • North Korean Hackers Adopted AI to Generate Malware Attacking Developers and Engineering Teams

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Infotainment, EV Charger Exploits Earn Hackers $1M at Pwn2Own Automotive 2026
  • New Windows Notepad and Paint Update Brings More Useful AI Features
  • Fresh SmarterMail Flaw Exploited for Admin Access
  • 2 Venezuelans Convicted in US for Using Malware to Hack ATMs
  • North Korean Hackers Adopted AI to Generate Malware Attacking Developers and Engineering Teams

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark