Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

Posted on January 30, 2026January 30, 2026 By CWS

Ravie LakshmananJan 30, 2026Vulnerability / E-mail Safety
SmarterTools has addressed two extra safety flaws in SmarterMail e-mail software program, together with one crucial safety flaw that would lead to arbitrary code execution.
The vulnerability, tracked as CVE-2026-24423, carries a CVSS rating of 9.3 out of 10.0.
“SmarterTools SmarterMail variations prior to construct 9511 include an unauthenticated distant code execution vulnerability within the ConnectToHub API methodology,” in line with an outline of the flaw in CVE.org.
“The attacker might level the SmarterMail to the malicious HTTP server, which serves the malicious OS [operating system] command. This command can be executed by the susceptible software.”
watchTowr researchers Sina Kheirkhah and Piotr Bazydlo, CODE WHITE GmbH’s Markus Wulftange, and VulnCheck’s Cale Black have been credited with discovering and reporting the vulnerability.
The safety gap has been addressed in model Construct 9511, launched on January 15, 2026. The identical construct additionally patches one other crucial flaw (CVE-2026-23760, CVSS rating: 9.3) that has since come beneath lively exploitation within the wild.

As well as, SmarterTools has shipped fixes to plug a medium-severity safety vulnerability (CVE-2026-25067, CVSS rating: 6.9) that would enable an attacker to facilitate NTLM relay assaults and unauthorized community authentication.
It has been described as a case of unauthenticated path coercion affecting the background-of-the-day preview endpoint.
“The appliance base64-decodes attacker-supplied enter and makes use of it as a filesystem path with out validation,” VulnCheck famous in an alert.
“On Home windows techniques, this enables UNC [Universal Naming Convention] paths to be resolved, inflicting the SmarterMail service to provoke outbound SMB authentication makes an attempt to attacker-controlled hosts. This may be abused for credential coercion, NTLM relay assaults, and unauthorized community authentication.”
The vulnerability has been patched in Construct 9518, launched on January 22, 2026. With two vulnerabilities in SmarterMail coming beneath lively exploitation over the previous week, it is important that customers replace to the most recent model as quickly as potential.

The Hacker News Tags:Critical, CVSS, Fixes, Flaw, RCE, Score, SmarterMail, Unauthenticated

Post navigation

Previous Post: 3,280,081 Fortinet Devices Online With Exposed Web Properties Under Risk
Next Post: Hackers Weaponized Open VSX Extension with Sophisticated Malware After Reaching 5066 Downloads

Related Posts

Chinese Hackers Use Anthropic’s AI to Launch Automated Cyber Espionage Campaign The Hacker News
NVIDIA Triton Bugs Let Unauthenticated Attackers Execute Code and Hijack AI Servers The Hacker News
The High (and Hidden) Costs for Cloud-First Businesses The Hacker News
ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining Botnet The Hacker News
Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery The Hacker News
New Rust-Based Malware “ChaosBot” Uses Discord Channels to Control Victims’ PCs The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Badges, Bytes and Blackmail
  • Hugging Face Abused to Deploy Android RAT
  • ICS Devices Bricked Following Russia-Linked Intrusion Into Polish Power Grid
  • Critical Ivanti Endpoint Manager RCE Vulnerabilities Actively Exploited in Attacks
  • Education-Themed Malicious Domains Linked to Bulletproof Hosting Infrastructure Exposed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Badges, Bytes and Blackmail
  • Hugging Face Abused to Deploy Android RAT
  • ICS Devices Bricked Following Russia-Linked Intrusion Into Polish Power Grid
  • Critical Ivanti Endpoint Manager RCE Vulnerabilities Actively Exploited in Attacks
  • Education-Themed Malicious Domains Linked to Bulletproof Hosting Infrastructure Exposed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark