Security
CISA Alert: SmarterMail RCE Vulnerability Exploited in Ransomware Campaigns
CISA Warns of Critical SmarterMail Vulnerability Exploited in Ransomware Attacks
Recently, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a warning regarding ransomware actors exploiting a critical vulnerability in SmarterMail, identified as CVE-2026-24423. This flaw in SmarterMail enables remote code execution without the need for authentication.
SmarterMail is a self-hosted email server and collaboration platform designed for Windows users by SmarterTools. It offers a range of services including SMTP/IMAP/POP mail services, webmail, calendars, contacts, and basic groupware functionality. The platform is commonly utilized by managed service providers (MSPs), small to medium-sized businesses, and hosting companies around the world, with approximately 15 million users across 120 countries according to SmarterTools.
Exploiting CVE-2026-24423 in SmarterMail
The vulnerability in question impacts versions of SmarterMail prior to build 9511. Exploiting this flaw could result in remote code execution (RCE) through the ConnectToHub API. Security researchers from watchTowr, CODE WHITE, and VulnCheck cybersecurity companies responsibly disclosed the vulnerability to SmarterTools, prompting the vendor to release a fix in SmarterMail Build 9511 on January 15.
CISA has recognized the severity of the situation by adding the CVE-2026-24423 vulnerability to its Known Exploited Vulnerabilities (KEV) catalog. The agency has identified the exploit as actively used in ransomware campaigns.
The agency states, “SmarterTools SmarterMail contains a missing authentication for a critical function vulnerability in the ConnectToHub API method. This could allow the attacker to point the SmarterMail instance to a malicious HTTP server that serves the malicious OS command and could lead to command execution.”
As a result, CISA has issued guidance for federal agencies and entities obligated under BOD 22-01 to either apply the security updates and recommended mitigations or discontinue the use of SmarterMail by February 26, 2026.
Additional Security Concerns and Recommendations
Following the patch for CVE-2026-24423, watchTowr researchers discovered another authentication bypass flaw internally designated as WT-2026-0001. This flaw allows the resetting of the administrator password without verification and has been exploited by threat actors shortly after the patch release. To address these security issues, SmarterMail has released additional critical security patches, with the latest build being 9526, made available on January 30.
Modern IT infrastructure moves faster than manual workflows can handle.
Discover how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows using tools you already have in the new Tines guide.
-
Facebook4 months agoEU Takes Action Against Instagram and Facebook for Violating Illegal Content Rules
-
Facebook4 months agoWarning: Facebook Creators Face Monetization Loss for Stealing and Reposting Videos
-
Facebook4 months agoFacebook Compliance: ICE-tracking Page Removed After US Government Intervention
-
Facebook4 months agoInstaDub: Meta’s AI Translation Tool for Instagram Videos
-
Facebook2 months agoFacebook’s New Look: A Blend of Instagram’s Style
-
Facebook2 months agoFacebook and Instagram to Reduce Personalized Ads for European Users
-
Facebook2 months agoReclaim Your Account: Facebook and Instagram Launch New Hub for Account Recovery
-
Apple4 months agoMeta discontinues Messenger apps for Windows and macOS

