TROYANOSYVIRUS
Voltar para CVEs

CVE-2026-23760

CRITICALCISA KEV
9.8

Descricao

SmarterTools SmarterMail versions prior to build 9511 contain an authentication bypass vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts. An unauthenticated attacker can supply a target administrator username and a new password to reset the account, resulting in full administrative compromise of the SmarterMail instance. NOTE: SmarterMail system administrator privileges grant the ability to execute operating system commands via built-in management functionality, effectively providing administrative (SYSTEM or root) access on the underlying host.

Detalhes CVE

Pontuacao CVSS v3.19.8
SeveridadeCRITICAL
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado1/22/2026
Ultima modificacao1/27/2026
Fontekev
Avistamentos honeypot0

CISA KEV

FornecedorSmarterTools
ProdutoSmarterMail
Nome da vulnerabilidadeSmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability
Data inclusao KEV2026-01-26
Prazo de remediacao2026-02-16
Uso em ransomwareKnown

Produtos afetados

smartertools:smartermail

Fraquezas (CWE)

CWE-288

Correlacoes IOC

Sem correlacoes registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.