Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Ransomware attackers are exploiting critical SmarterMail vulnerability (CVE-2026-24423)
    Cybersecurity

    Ransomware attackers are exploiting critical SmarterMail vulnerability (CVE-2026-24423)

    adminBy adminFebruary 6, 2026No Comments2 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Ransomware attackers are exploiting critical SmarterMail vulnerability (CVE-2026-24423)
    Share
    Facebook Twitter LinkedIn Pinterest Email

    For the third time in two weeks, CISA added a vulnerability (CVE-2026-24423) affecting SmarterTools’ SmarterMail email and collaboration server to its Known Exploited Vulnerabilities catalog, and this one is being exploited in ransomware attacks.

    ransomware SmarterMail CVE-2026-24423

    A glut of SmarterMail vulnerabilities

    On January 26, the US cybersecurity agency listed CVE-2025-52691 (a unrestricted upload of file with dangerous type vulnerability) and CVE-2026-23760 (an authentication bypass flaw) affecting SmarterMail in the KEV catalog.

    WatchTowr researchers analyzed and shared technical details of both vulnerabilities, and in-the-wild exploitation of the latter was soon confirmed by several security companies.

    About CVE-2026-24423

    CVE-2026-24423, which was indepentently reported by Sina Kheirkhah and Piotr Bazydlo of watchTowr, Markus Wulftange of CODE WHITE GmbH, and Cale Black of VulnCheck, stems from missing authentication for a critical function – SmarterMail’s ConnectToHub API.

    It affects SmarterMail versions before v100.0.9511, allowing unauthenticated attackers to achieve remote code execution by sending a specially crafted POST request that will be executed by the vulnerable application.

    “The vulnerable API endpoint (/api/v1/settings/sysadmin/connect-to-hub) does not require authentication and configures the mounted path of the server. This mount command is controlled by the remote server, and arbitrary commands are defined as helpers to mount on all supported platforms,” Black explained.

    The connect-to-hub endpoint processes remote addresses in the hubAddress parameter and requests /web/api/node-management/setup-initial-connection (or in older versions, /web/api/hub-connection/setup-initial-connection) on the attacker-controlled server. The server then responds with a JSON object that includes the CommandMount parameter, which will allow the adversary to define arbitrary command execution parameters and, if the parameter checks are satisfied, will execute commands on all platforms.

    He advised users to update to the latest SmarterMail build available and enterprise defenders to look into the logs for suspicious interactions with the unsecured endpoint.

    The US Cybersecurity and Infrastructure Security Agency ordered US federal civilian agencies to address the vulnerability by February 26, 2026.

    Subscribe to our breaking news e-mail alert to never miss out on the latest breaches, vulnerabilities and cybersecurity threats. Subscribe here!

    attackers Critical CVE202624423 exploiting ransomware SmarterMail vulnerability
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleRaspberry Pi projects to try this weekend (February 6
    Next Article A Sling One-Day Pass Is the Best Way to Catch a Major Sporting Event Without Cable
    admin
    • Website

    Related Posts

    NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions

    April 17, 2026

    GitLab 18.11 brings agentic AI to security fixes, CI pipelines, and delivery analytics

    April 17, 2026

    Some Windows servers enter reboot loops after April patches

    April 17, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions

    April 17, 2026

    AI Agents Are Here And Your Website Isn’t Ready, Says No Hacks Podcast Host

    April 17, 2026

    Wavelet: headphone equalizer 26.04 APK Download by pittvandewitt

    April 17, 2026

    GitLab 18.11 brings agentic AI to security fixes, CI pipelines, and delivery analytics

    April 17, 2026
    Categories
    • Blogging (63)
    • Cybersecurity (1,362)
    • Privacy & Online Earning (170)
    • SEO & Digital Marketing (836)
    • Tech Tools & Mobile / Apps (1,627)
    • WiFi / Internet & Networking (227)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions

    April 17, 2026

    AI Agents Are Here And Your Website Isn’t Ready, Says No Hacks Podcast Host

    April 17, 2026

    Wavelet: headphone equalizer 26.04 APK Download by pittvandewitt

    April 17, 2026
    Most Popular
    • NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions
    • AI Agents Are Here And Your Website Isn’t Ready, Says No Hacks Podcast Host
    • Wavelet: headphone equalizer 26.04 APK Download by pittvandewitt
    • GitLab 18.11 brings agentic AI to security fixes, CI pipelines, and delivery analytics
    • OnePlus’ Europe exit isn’t official yet, but the signs aren’t great
    • Some Windows servers enter reboot loops after April patches
    • Why your website is now the source of truth in local AI search
    • Cursor AI Vulnerability Exposed Developer Devices
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.