TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2026-23760

CRITICALCISA KEV
9.8

Beschreibung

SmarterTools SmarterMail versions prior to build 9511 contain an authentication bypass vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts. An unauthenticated attacker can supply a target administrator username and a new password to reset the account, resulting in full administrative compromise of the SmarterMail instance. NOTE: SmarterMail system administrator privileges grant the ability to execute operating system commands via built-in management functionality, effectively providing administrative (SYSTEM or root) access on the underlying host.

CVE Details

CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht1/22/2026
Zuletzt geandert1/27/2026
Quellekev
Honeypot-Sichtungen0

CISA KEV

HerstellerSmarterTools
ProduktSmarterMail
SchwachstellennameSmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability
KEV Aufnahmedatum2026-01-26
Behebungsfrist2026-02-16
Ransomware-NutzungKnown

Betroffene Produkte

smartertools:smartermail

Schwachen (CWE)

CWE-288

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.