CVE-2026-23760

critical

Description

SmarterTools SmarterMail versions prior to build 9511 contain an authentication bypass vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts. An unauthenticated attacker can supply a target administrator username and a new password to reset the account, resulting in full administrative compromise of the SmarterMail instance. NOTE: SmarterMail system administrator privileges grant the ability to execute operating system commands via built-in management functionality, effectively providing administrative (SYSTEM or root) access on the underlying host.

References

https://hackread.com/storm-1175-hackers-24-hour-medusa-ransomware-flaw/

https://www.securityweek.com/medusa-ransomware-fast-to-exploit-vulnerabilities-breached-systems/

https://www.darkreading.com/threat-intelligence/storm-1175-medusa-ransomware-high-velocity

https://thehackernews.com/2026/04/china-linked-storm-1175-exploits-zero.html

https://securityaffairs.com/190440/cyber-crime/fast-moving-storm-1175-uses-new-exploits-to-breach-networks-and-drop-medusa.html

https://www.bleepingcomputer.com/news/security/microsoft-links-medusa-ransomware-affiliate-to-zero-day-attacks/

https://therecord.media/medusa-ransomware-group-zero-days-microsoft

https://thehackernews.com/2026/02/warlock-ransomware-breaches.html

https://www.securityweek.com/smartertools-hit-by-ransomware-via-vulnerability-in-its-own-product/

https://www.bleepingcomputer.com/news/security/hackers-breach-smartertools-network-using-flaw-in-its-own-software/

https://www.helpnetsecurity.com/2026/02/06/ransomware-smartermail-cve-2026-24423/

https://thehackernews.com/2026/01/smartermail-fixes-critical.html

https://securityaffairs.com/187375/security/u-s-cisa-adds-microsoft-office-gnu-inetutils-smartertools-smartermail-and-linux-kernel-flaws-to-its-known-exploited-vulnerabilities-catalog.html

https://www.cisa.gov/news-events/alerts/2026/01/26/cisa-adds-five-known-exploited-vulnerabilities-catalog

https://www.securityweek.com/fresh-smartermail-flaw-exploited-for-admin-access/

https://www.huntress.com/blog/smartermail-account-takeover-leading-to-rce

https://labs.watchtowr.com/attackers-with-decompilers-strike-again-smartertools-smartermail-wt-2026-0001-auth-bypass/

Details

Source: Mitre, NVD

Published: 2026-01-22

Updated: 2026-01-27

Known Exploited Vulnerability (KEV)

Risk Information

CVSS v2

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Severity: Critical

CVSS v3

Base Score: 9.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical

CVSS v4

Base Score: 9.3

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Severity: Critical

EPSS

EPSS: 0.81735