SmarterTools SmarterMail versions prior to build 9511 contain an authentication bypass vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts. An unauthenticated attacker can supply a target administrator username and a new password to reset the account, resulting in full administrative compromise of the SmarterMail instance. NOTE: SmarterMail system administrator privileges grant the ability to execute operating system commands via built-in management functionality, effectively providing administrative (SYSTEM or root) access on the underlying host.
https://hackread.com/storm-1175-hackers-24-hour-medusa-ransomware-flaw/
https://www.securityweek.com/medusa-ransomware-fast-to-exploit-vulnerabilities-breached-systems/
https://www.darkreading.com/threat-intelligence/storm-1175-medusa-ransomware-high-velocity
https://thehackernews.com/2026/04/china-linked-storm-1175-exploits-zero.html
https://therecord.media/medusa-ransomware-group-zero-days-microsoft
https://thehackernews.com/2026/02/warlock-ransomware-breaches.html
https://www.securityweek.com/smartertools-hit-by-ransomware-via-vulnerability-in-its-own-product/
https://www.helpnetsecurity.com/2026/02/06/ransomware-smartermail-cve-2026-24423/
https://thehackernews.com/2026/01/smartermail-fixes-critical.html
https://www.securityweek.com/fresh-smartermail-flaw-exploited-for-admin-access/
https://www.huntress.com/blog/smartermail-account-takeover-leading-to-rce
Published: 2026-01-22
Updated: 2026-01-27
Known Exploited Vulnerability (KEV)
Base Score: 10
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Severity: Critical
Base Score: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: Critical
Base Score: 9.3
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Severity: Critical
EPSS: 0.81735