TROYANOSYVIRUS
Volver a CVEs

CVE-2026-23760

CRITICALCISA KEV
9.8

Descripcion

SmarterTools SmarterMail versions prior to build 9511 contain an authentication bypass vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts. An unauthenticated attacker can supply a target administrator username and a new password to reset the account, resulting in full administrative compromise of the SmarterMail instance. NOTE: SmarterMail system administrator privileges grant the ability to execute operating system commands via built-in management functionality, effectively providing administrative (SYSTEM or root) access on the underlying host.

Detalles CVE

Puntuacion CVSS v3.19.8
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado1/22/2026
Ultima modificacion1/27/2026
Fuentekev
Avistamientos honeypot0

CISA KEV

VendedorSmarterTools
ProductoSmarterMail
Nombre vulnerabilidadSmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability
Fecha inclusion KEV2026-01-26
Fecha limite remediacion2026-02-16
Uso en ransomwareKnown

Productos afectados

smartertools:smartermail

Debilidades (CWE)

CWE-288

Correlaciones IOC

Sin correlaciones registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.