Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
6000+ Vulnerable SmarterTools SmarterMail Servers Exposed to Actively Exploited RCE Vulnerability

6000+ Vulnerable SmarterTools SmarterMail Servers Exposed to Actively Exploited RCE Vulnerability

Posted on January 27, 2026January 28, 2026 By CWS

Over 6,000 SmarterMail servers uncovered on the web are working weak variations which might be liable to energetic distant code execution (RCE) assaults.

Safety researchers recognized the issues by way of day by day HTTP vulnerability scans, and exploitation makes an attempt have already been noticed within the wild.

This represents a major risk to organizations worldwide counting on SmarterMail for enterprise e mail operations.​

Vulnerability Overview

CVE-2026-23760 is a vital authentication bypass vulnerability within the SmarterMail password reset API affecting all variations previous to Construct 9511, launched January 15, 2026.

The vulnerability carries a CVSS rating of 9.3, indicating excessive danger to affected programs.

The flaw exists within the /api/v1/auth/force-reset-password endpoint, which allows unauthenticated requests with out requiring password verification or reset tokens when focusing on administrator accounts.

An attacker exploiting this vulnerability can provide any administrator username with a brand new password, reaching quick administrative account takeover.

Critically, SmarterMail directors have built-in performance that allows direct execution of working system instructions by way of the Settings interface, successfully elevating the compromise to SYSTEM-level entry on the underlying host.

A number of safety organizations have confirmed energetic exploitation since at the very least January 17, 2026, simply two days after the patch launch.

Huntress Labs noticed risk actors utilizing the compromised administrator accounts to create malicious System Occasions configured to execute reconnaissance instructions on weak hosts.

The assault chain demonstrates a classy understanding of SmarterMail structure, with attackers systematically resetting accounts, acquiring authentication tokens, and putting in persistent backdoors.

Watchtowr Labs obtained nameless stories confirming risk actors exploiting the vulnerability in manufacturing environments.

We added SmarterTools SmarterMail CVE-2026-23760 RCE to our day by day Weak HTTP scans. Round 6000 IPs globally discovered seemingly weak based mostly on our model examine. We additionally see exploitation makes an attempt within the wild. CVE-2026-23760 Geo Treemap View: pic.twitter.com/jDufbmo67s— The Shadowserver Basis (@Shadowserver) January 26, 2026

Significantly regarding, on condition that attackers actively monitor launch notes and carry out patch diffing to reverse-engineer vulnerabilities.​

Shadowserver’s geographically distributed scanning reveals weak cases throughout a number of continents, although the precise regional breakdown has not been publicly detailed.

The invention of 6,000 weak IPs underscores the numerous assault floor, notably as many organizations stay unaware of obtainable patches.​

SmarterTools strongly recommends updating to the most recent construct instantly. Organizations ought to prioritize patching as attackers actively goal unpatched cases, with no proof of slowing exploitation makes an attempt.

Safety groups ought to overview administrator account exercise logs for unauthorized password resets. Examine potential net shells or malware put in by way of exploitation, and make sure system backups stay uncompromised.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Actively, Exploited, Exposed, RCE, Servers, SmarterMail, SmarterTools, Vulnerability, Vulnerable

Post navigation

Previous Post: ‘PackageGate’ Flaws Open JavaScript Ecosystem to Supply Chain Attacks
Next Post: MEDUSA Security Testing Tool With 74 Scanners and 180+ AI Agent Security Rules

Related Posts

10 Best Bot Protection Software 10 Best Bot Protection Software Cyber Security News
Vulnerable Codes in Legacy Python Packages Enables Attacks on Python Package Index Via Domain Compromise Vulnerable Codes in Legacy Python Packages Enables Attacks on Python Package Index Via Domain Compromise Cyber Security News
Rising Phishing Threats Exploit Microsoft Teams and Email Rising Phishing Threats Exploit Microsoft Teams and Email Cyber Security News
APT36 Hackers Attacking Indian Defense Personnel in Sophisticated Phishing Attack APT36 Hackers Attacking Indian Defense Personnel in Sophisticated Phishing Attack Cyber Security News
Lucid PhaaS With 17,500 Phishing Domains Mimics 316 Brands From 74 Countries Lucid PhaaS With 17,500 Phishing Domains Mimics 316 Brands From 74 Countries Cyber Security News
Scattered Spider Upgraded Their Tactics to Abuse Legitimate Tools to Evade Detection and Maintain Persistence Scattered Spider Upgraded Their Tactics to Abuse Legitimate Tools to Evade Detection and Maintain Persistence Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark