Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

6000+ Vulnerable SmarterTools SmarterMail Servers Exposed to Actively Exploited RCE Vulnerability

Posted on January 27, 2026January 28, 2026 By CWS

Over 6,000 SmarterMail servers uncovered on the web are working weak variations which might be liable to energetic distant code execution (RCE) assaults.

Safety researchers recognized the issues by way of day by day HTTP vulnerability scans, and exploitation makes an attempt have already been noticed within the wild.

This represents a major risk to organizations worldwide counting on SmarterMail for enterprise e mail operations.​

Vulnerability Overview

CVE-2026-23760 is a vital authentication bypass vulnerability within the SmarterMail password reset API affecting all variations previous to Construct 9511, launched January 15, 2026.

The vulnerability carries a CVSS rating of 9.3, indicating excessive danger to affected programs.

The flaw exists within the /api/v1/auth/force-reset-password endpoint, which allows unauthenticated requests with out requiring password verification or reset tokens when focusing on administrator accounts.

An attacker exploiting this vulnerability can provide any administrator username with a brand new password, reaching quick administrative account takeover.

Critically, SmarterMail directors have built-in performance that allows direct execution of working system instructions by way of the Settings interface, successfully elevating the compromise to SYSTEM-level entry on the underlying host.

A number of safety organizations have confirmed energetic exploitation since at the very least January 17, 2026, simply two days after the patch launch.

Huntress Labs noticed risk actors utilizing the compromised administrator accounts to create malicious System Occasions configured to execute reconnaissance instructions on weak hosts.

The assault chain demonstrates a classy understanding of SmarterMail structure, with attackers systematically resetting accounts, acquiring authentication tokens, and putting in persistent backdoors.

Watchtowr Labs obtained nameless stories confirming risk actors exploiting the vulnerability in manufacturing environments.

We added SmarterTools SmarterMail CVE-2026-23760 RCE to our day by day Weak HTTP scans. Round 6000 IPs globally discovered seemingly weak based mostly on our model examine. We additionally see exploitation makes an attempt within the wild. CVE-2026-23760 Geo Treemap View: pic.twitter.com/jDufbmo67s— The Shadowserver Basis (@Shadowserver) January 26, 2026

Significantly regarding, on condition that attackers actively monitor launch notes and carry out patch diffing to reverse-engineer vulnerabilities.​

Shadowserver’s geographically distributed scanning reveals weak cases throughout a number of continents, although the precise regional breakdown has not been publicly detailed.

The invention of 6,000 weak IPs underscores the numerous assault floor, notably as many organizations stay unaware of obtainable patches.​

SmarterTools strongly recommends updating to the most recent construct instantly. Organizations ought to prioritize patching as attackers actively goal unpatched cases, with no proof of slowing exploitation makes an attempt.

Safety groups ought to overview administrator account exercise logs for unauthorized password resets. Examine potential net shells or malware put in by way of exploitation, and make sure system backups stay uncompromised.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Actively, Exploited, Exposed, RCE, Servers, SmarterMail, SmarterTools, Vulnerability, Vulnerable

Post navigation

Previous Post: ‘PackageGate’ Flaws Open JavaScript Ecosystem to Supply Chain Attacks
Next Post: MEDUSA Security Testing Tool With 74 Scanners and 180+ AI Agent Security Rules

Related Posts

Ransomware Actors Exploit Unpatched SimpleHelp RMM to Compromise Billing Software Provider Cyber Security News
How Threat Intelligence Feeds Help Organizations Quickly Mitigate Malware Attacks Cyber Security News
Jaguar Land Rover Confirms Employee Data Stolen in August Cyberattack Cyber Security News
Lenovo Vantage Vulnerabilities Allow Attackers to Escalate Privileges as SYSTEM User Cyber Security News
Open-Source C2 Platform AdaptixC2 Released With Enhanced Stability, Performance, and Speed Cyber Security News
Hackers Actively Exploiting 7-Zip RCE Vulnerability in the Wild Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Ivanti Patches Exploited EPMM Zero-Days
  • Ex-Google Engineer Convicted for Stealing 2,000 AI Trade Secrets for China Startup
  • Hackers Weaponized Open VSX Extension with Sophisticated Malware After Reaching 5066 Downloads
  • Two Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released
  • Microsoft Releases Update for Windows 11, version 25H2 and 24H2 Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Ivanti Patches Exploited EPMM Zero-Days
  • Ex-Google Engineer Convicted for Stealing 2,000 AI Trade Secrets for China Startup
  • Hackers Weaponized Open VSX Extension with Sophisticated Malware After Reaching 5066 Downloads
  • Two Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released
  • Microsoft Releases Update for Windows 11, version 25H2 and 24H2 Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark