SmarterMail Servers Exposed to Remote Code Execution: CVE-2026-24423

smartermail email

SmarterTools has released urgent security updates for its SmarterMail email server software, fixing multiple serious vulnerabilities, including a critical unauthenticated remote code execution (RCE) flaw that could allow attackers to take full control of affected servers. The most severe issue, tracked as CVE-2026-24423, carries a CVSS score of 9.3, highlighting its high risk and potential impact.

SmarterMail is widely used by organizations as an on-premises email and collaboration platform. Because email servers often have direct internet exposure and access to sensitive data, vulnerabilities in such systems are highly attractive to cybercriminals. The newly disclosed flaws further reinforce the importance of timely patching and proactive security management.

According to the official CVE description, SmarterMail versions prior to Build 9511 contain an unauthenticated remote code execution vulnerability in the ConnectToHub API method.

This flaw allows an attacker to interact with the SmarterMail server without any authentication. By pointing the vulnerable server to a malicious HTTP server, an attacker can deliver a harmful operating system command. The SmarterMail application then executes this command directly on the server.

In simple terms, this means:

  • No login is required

  • The attacker can remotely run system commands

  • Full server compromise is possible

Such a vulnerability could enable attackers to:

  • Install malware or backdoors

  • Steal or manipulate email data

  • Move laterally inside the network

  • Use the server for further attacks, such as spam campaigns or ransomware distribution

Given the severity and ease of exploitation, this vulnerability represents a critical risk for organizations running unpatched SmarterMail servers.

The vulnerability was responsibly disclosed by several well-known security researchers and teams, including:

  • Sina Kheirkhah and Piotr Bazydlo from watchTowr

  • Markus Wulftange of CODE WHITE GmbH

  • Cale Black from VulnCheck

Their coordinated disclosure helped SmarterTools identify and fix the issue before even wider exploitation occurred.

SmarterTools addressed CVE-2026-24423 in SmarterMail Build 9511, which was released on January 15, 2026. This update closes the vulnerable API behavior and prevents attackers from executing arbitrary commands via the ConnectToHub method.

However, this is not the only serious issue fixed in the same release.

Alongside CVE-2026-24423, SmarterTools also patched another critical vulnerability, tracked as CVE-2026-23760, which also carries a CVSS score of 9.3.

More concerning is the fact that CVE-2026-23760 has already been observed under active exploitation in the wild. This significantly raises the urgency for administrators, as attackers are actively targeting unpatched SmarterMail systems.

When vulnerabilities move from disclosure to real-world exploitation, the window for safe patching becomes extremely small.

In addition to the critical RCE flaws, SmarterTools also fixed a medium-severity security issue, tracked as CVE-2026-25067, with a CVSS score of 6.9.

This vulnerability involves unauthenticated path coercion affecting the background-of-the-day preview endpoint in SmarterMail.

According to VulnCheck, the issue occurs because:

  • The application base64-decodes attacker-controlled input

  • The decoded input is used as a filesystem path without proper validation

On Windows systems, this behavior allows attackers to supply UNC (Universal Naming Convention) paths. As a result, the SmarterMail service may attempt to authenticate to an attacker-controlled SMB server.

This can lead to:

  • Credential coercion

  • NTLM relay attacks

  • Unauthorized network authentication

While this flaw is rated lower than the RCE vulnerabilities, it can still be dangerous, especially in corporate Windows environments where NTLM authentication is widely used.

patch now

The NTLM relay vulnerability CVE-2026-25067 has been fixed in SmarterMail Build 9518, released on January 22, 2026. Administrators are strongly advised to upgrade to this version or later to fully protect their systems.

With multiple SmarterMail vulnerabilities disclosed within a short time frame, and at least two of them already seeing active exploitation, delaying updates can expose organizations to serious cyber risks.

Unpatched email servers are prime targets for:

  • Ransomware operators

  • Credential-stealing campaigns

  • Espionage and data theft

  • Botnet recruitment

Because SmarterMail often runs with elevated privileges and handles sensitive communications, a successful attack could have far-reaching business and compliance consequences.

To reduce risk and protect your environment, SmarterTools users should take the following steps immediately:

  1. Upgrade SmarterMail to the latest available build (Build 9518 or newer)

  2. Restrict external access to management and API endpoints where possible

  3. Monitor server logs for suspicious outbound connections or command execution

  4. Review NTLM usage and consider hardening or disabling it if not required

  5. Apply network segmentation to limit potential lateral movement

The discovery of CVE-2026-24423, along with other critical and medium-severity flaws, highlights ongoing security challenges in widely used email server software. SmarterTools has acted quickly to release patches, but the responsibility now lies with administrators to deploy them without delay.

Organizations running SmarterMail should treat these updates as urgent. In today’s threat landscape, even a short delay in patching can be enough for attackers to gain a foothold and cause serious damage.

Follow us on Twitter and Linkedin for real time updates and exclusive content.

1 thought on “SmarterMail Servers Exposed to Remote Code Execution: CVE-2026-24423”

  1. Pingback: Notepad++ Supply Chain Attack Redirected Updates to Malware

Comments are closed.

Scroll to Top