Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
8000+ SmarterMail Hosts Vulnerable to RCE Attack

8000+ SmarterMail Hosts Vulnerable to RCE Attack

Posted on January 13, 2026January 13, 2026 By CWS

Over 8,000 internet-exposed SmarterMail servers stay susceptible to a essential distant code execution flaw tracked as CVE-2025-52691, in line with scans performed on January 12, 2026.

Safety researchers recognized 8,001 distinctive IP addresses seemingly affected out of 18,783 uncovered cases, with proof-of-concept exploits now publicly obtainable. This maximum-severity vulnerability poses extreme dangers to organizations counting on the e-mail platform for enterprise communications.​

CVE-2025-52691 stems from an unauthenticated arbitrary file add flaw in SmarterMail variations Construct 9406 and earlier. Attackers can add malicious recordsdata to any server location with out credentials, enabling distant code execution below the service’s privileges.

The Nationwide Vulnerability Database (NVD) assigns it a CVSS v3.1 rating of 10.0 with the vector AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H, marking it as critically exploitable over the community with low complexity.

DetailInformationCVE IDCVE-2025-52691 ​DescriptionUnauthenticated arbitrary file add resulting in RCE ​CVSS Score10.0 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) ​Affected VersionsSmarterMail Construct 9406 and earlier ​Fastened VersionBuild 9413 and later ​CWECWE-434 (Unrestricted Add of File with Harmful Kind) ​

Profitable exploitation permits full server compromise, knowledge exfiltration, webshell deployment, or lateral motion. Disclosed in late December 2025, the flaw prompted alerts from companies together with Singapore’s Cyber Safety Company (CSA) and Belgium’s CCB.x+3​

Shadowserver UK’s newest dashboard reveals widespread publicity, with america internet hosting round 5,000 susceptible cases, adopted by the UK and Malaysia.

Scans affirm 42.6% of uncovered SmarterMail hosts (8,001/18,783) fail vulnerability checks, seemingly attributable to delayed patching. Censys reported related figures earlier, noting over 16,000 uncovered globally, predominantly within the US (12,500+).

Public PoCs on platforms like Sploitus display easy HTTP requests for file uploads, escalating to RCE through ASPX webshells. No widespread in-the-wild exploitation is confirmed but, however the public exploits heighten dangers for unpatched mail servers instantly internet-facing.

Directors should improve to SmarterMail Construct 9413 or later, ideally the most recent Construct 9483, for remediation. Interim steps embrace limiting exterior entry to admin interfaces, monitoring logs for anomalous uploads, and scanning for IOCs like surprising recordsdata in executable directories.

Organizations ought to confirm publicity through instruments like Shadowserver reviews and prioritize electronic mail infrastructure in patch administration.

This vulnerability underscores the risks of unpatched electronic mail servers, doubtlessly enabling spam relays, phishing bases, or ransomware vectors. With CVSS perfection and straightforward exploits, speedy motion is important to avert breaches.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Attack, Hosts, RCE, SmarterMail, Vulnerable

Post navigation

Previous Post: Multi-Stage Windows Malware Invokes PowerShell Downloader Using Text-based Payloads Using Remote Host
Next Post: FortiOS and FortiSwitchManager Vulnerability Let Remote Attackers Execute Arbitrary Code

Related Posts

Capita To pay £14 Million For Data Breach Exposes 6.6 Million Users Personal Data Capita To pay £14 Million For Data Breach Exposes 6.6 Million Users Personal Data Cyber Security News
Critical Windows Flaw Allows SYSTEM Level Access Critical Windows Flaw Allows SYSTEM Level Access Cyber Security News
UNC3886 Hackers Exploiting 0-Days in VMware vCenter/ESXi, Fortinet FortiOS, and Juniper Junos OS UNC3886 Hackers Exploiting 0-Days in VMware vCenter/ESXi, Fortinet FortiOS, and Juniper Junos OS Cyber Security News
CISA Releases Best Security Practices Guide for Hardening Microsoft Exchange Server CISA Releases Best Security Practices Guide for Hardening Microsoft Exchange Server Cyber Security News
5 Must-Follow Rules of Every Elite SOC: CISO’s Checklist 5 Must-Follow Rules of Every Elite SOC: CISO’s Checklist Cyber Security News
New ‘Sryxen’ Stealer Bypasses Chrome Encryption via Headless Browser Technique New ‘Sryxen’ Stealer Bypasses Chrome Encryption via Headless Browser Technique Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark