Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
6000+ Vulnerable SmarterTools SmarterMail Servers Exposed to Actively Exploited RCE Vulnerability

6000+ Vulnerable SmarterTools SmarterMail Servers Exposed to Actively Exploited RCE Vulnerability

Posted on January 27, 2026January 28, 2026 By CWS

Over 6,000 SmarterMail servers uncovered on the web are working weak variations which might be liable to energetic distant code execution (RCE) assaults.

Safety researchers recognized the issues by way of day by day HTTP vulnerability scans, and exploitation makes an attempt have already been noticed within the wild.

This represents a major risk to organizations worldwide counting on SmarterMail for enterprise e mail operations.​

Vulnerability Overview

CVE-2026-23760 is a vital authentication bypass vulnerability within the SmarterMail password reset API affecting all variations previous to Construct 9511, launched January 15, 2026.

The vulnerability carries a CVSS rating of 9.3, indicating excessive danger to affected programs.

The flaw exists within the /api/v1/auth/force-reset-password endpoint, which allows unauthenticated requests with out requiring password verification or reset tokens when focusing on administrator accounts.

An attacker exploiting this vulnerability can provide any administrator username with a brand new password, reaching quick administrative account takeover.

Critically, SmarterMail directors have built-in performance that allows direct execution of working system instructions by way of the Settings interface, successfully elevating the compromise to SYSTEM-level entry on the underlying host.

A number of safety organizations have confirmed energetic exploitation since at the very least January 17, 2026, simply two days after the patch launch.

Huntress Labs noticed risk actors utilizing the compromised administrator accounts to create malicious System Occasions configured to execute reconnaissance instructions on weak hosts.

The assault chain demonstrates a classy understanding of SmarterMail structure, with attackers systematically resetting accounts, acquiring authentication tokens, and putting in persistent backdoors.

Watchtowr Labs obtained nameless stories confirming risk actors exploiting the vulnerability in manufacturing environments.

We added SmarterTools SmarterMail CVE-2026-23760 RCE to our day by day Weak HTTP scans. Round 6000 IPs globally discovered seemingly weak based mostly on our model examine. We additionally see exploitation makes an attempt within the wild. CVE-2026-23760 Geo Treemap View: pic.twitter.com/jDufbmo67s— The Shadowserver Basis (@Shadowserver) January 26, 2026

Significantly regarding, on condition that attackers actively monitor launch notes and carry out patch diffing to reverse-engineer vulnerabilities.​

Shadowserver’s geographically distributed scanning reveals weak cases throughout a number of continents, although the precise regional breakdown has not been publicly detailed.

The invention of 6,000 weak IPs underscores the numerous assault floor, notably as many organizations stay unaware of obtainable patches.​

SmarterTools strongly recommends updating to the most recent construct instantly. Organizations ought to prioritize patching as attackers actively goal unpatched cases, with no proof of slowing exploitation makes an attempt.

Safety groups ought to overview administrator account exercise logs for unauthorized password resets. Examine potential net shells or malware put in by way of exploitation, and make sure system backups stay uncompromised.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Actively, Exploited, Exposed, RCE, Servers, SmarterMail, SmarterTools, Vulnerability, Vulnerable

Post navigation

Previous Post: ‘PackageGate’ Flaws Open JavaScript Ecosystem to Supply Chain Attacks
Next Post: MEDUSA Security Testing Tool With 74 Scanners and 180+ AI Agent Security Rules

Related Posts

YouTube Down for Users Globally – Google Confirms Outage YouTube Down for Users Globally – Google Confirms Outage Cyber Security News
MediaTek Vulnerabilities Let Attackers Escalate Privileges Without User Interaction MediaTek Vulnerabilities Let Attackers Escalate Privileges Without User Interaction Cyber Security News
Fortinet FortiWeb Vulnerability (CVE-2025-64446) Exploited in the Wild for Full Admin Takeover Fortinet FortiWeb Vulnerability (CVE-2025-64446) Exploited in the Wild for Full Admin Takeover Cyber Security News
German ISP Aurologic GmbH has Become a Central Nexus for Hosting Malicious Infrastructure German ISP Aurologic GmbH has Become a Central Nexus for Hosting Malicious Infrastructure Cyber Security News
Pig-Butchering Scams Operators Scaled Their Operations with The Support of AI-Assistants Pig-Butchering Scams Operators Scaled Their Operations with The Support of AI-Assistants Cyber Security News
Teaching Claude to Cheat Reward Hacking Coding Tasks Makes Them Behave Maliciously in Other Tasks Teaching Claude to Cheat Reward Hacking Coding Tasks Makes Them Behave Maliciously in Other Tasks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News