Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Trellix Source Code Breach: Hackers Access Repository
May 2, 2026
Hackers Exploit cPanel Flaw to Breach Government Military
May 2, 2026
Exim Mail Server Vulnerabilities Lead to Crash via DNS Data
May 2, 2026
Home/Vulnerabilities/Actively Exploited RCE Hits 6 Vulnerable SmarterTools
Vulnerabilities

Actively Exploited RCE Hits 6 Vulnerable SmarterTools

Active remote code execution (RCE) attacks pose an immediate threat to over 6,000 SmarterMail servers. These internet-exposed instances operate vulnerable software versions, leaving them open to...

David kimber
David kimber
January 27, 2026 2 Min Read
0 0

Active remote code execution (RCE) attacks pose an immediate threat to over 6,000 SmarterMail servers. These internet-exposed instances operate vulnerable software versions, leaving them open to compromise.

Security researchers identified the flaws through daily HTTP vulnerability scans, and exploitation attempts have already been observed in the wild.

This represents a significant threat to organizations worldwide relying on SmarterMail for enterprise email operations.​

Vulnerability Overview

CVE-2026-23760 is a critical authentication bypass vulnerability in the SmarterMail password reset API affecting all versions prior to Build 9511, released January 15, 2026.

The vulnerability carries a CVSS score of 9.3, indicating extreme risk to affected systems.

The flaw exists in the /api/v1/auth/force-reset-password endpoint, which permits unauthenticated requests without requiring password verification or reset tokens when targeting administrator accounts.

An attacker exploiting this vulnerability can supply any administrator username with a new password, achieving immediate administrative account takeover.

Critically, SmarterMail administrators have built-in functionality that enables direct execution of operating system commands through the Settings interface, effectively elevating the compromise to SYSTEM-level access on the underlying host.

Multiple security organizations have confirmed active exploitation since at least January 17, 2026, just two days after the patch release.

Huntress Labs observed threat actors using the compromised administrator accounts to create malicious System Events configured to execute reconnaissance commands on vulnerable hosts.

The attack chain demonstrates a sophisticated understanding of SmarterMail architecture, with attackers systematically resetting accounts, obtaining authentication tokens, and installing persistent backdoors.

Watchtowr Labs received anonymous reports confirming threat actors exploiting the vulnerability in production environments.

We added SmarterTools SmarterMail CVE-2026-23760 RCE to our daily Vulnerable HTTP scans. Around 6000 IPs globally found likely vulnerable based on our version check. We also see exploitation attempts in the wild.

CVE-2026-23760 Geo Treemap View: https://t.co/QqZ674VxXG pic.twitter.com/jDufbmo67s

— The Shadowserver Foundation (@Shadowserver) January 26, 2026

Particularly concerning, given that attackers actively monitor release notes and perform patch diffing to reverse-engineer vulnerabilities.​

Shadowserver’s geographically distributed scanning reveals vulnerable instances across multiple continents, though the exact regional breakdown has not been publicly detailed.

The discovery of 6,000 vulnerable IPs underscores the significant attack surface, particularly as many organizations remain unaware of available patches.​

SmarterTools strongly recommends updating to the latest build immediately. Organizations should prioritize patching as attackers actively target unpatched instances, with no evidence of slowing exploitation attempts.

Security teams should review administrator account activity logs for unauthorized password resets. Investigate potential web shells or malware installed via exploitation, and confirm system backups remain uncompromised.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitMalwarePatchSecurityThreatVulnerability

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Deepfake Phishing Attacks Target Bitcoin Users via Zoom/

Next Post

MEDUSA Security Testing Tool With 74 Scanners and 180+ AI Agent

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
cPanelSniper PoC Exploit for cPanel Vulner Disclosed Vulnerability
May 2, 2026
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us