CVE-2026-24423

CRITICAL
2026-01-23 [email protected]
9.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 12, 2026 - 21:54 vuln.today
Added to CISA KEV
Feb 06, 2026 - 16:45 cisa
CISA KEV
CVE Published
Jan 23, 2026 - 17:16 nvd
CRITICAL 9.8

Description

SmarterTools SmarterMail versions prior to build 9511 contain an unauthenticated remote code execution vulnerability in the ConnectToHub API method. The attacker could point the SmarterMail to the malicious HTTP server, which serves the malicious OS command. This command will be executed by the vulnerable application.

Analysis

SmarterTools SmarterMail prior to build 9511 contains a second critical vulnerability (CVE-2026-24423) — an unauthenticated remote code execution flaw in the ConnectToHub API method. An attacker can redirect the SmarterMail server to connect to a malicious HTTP endpoint that serves OS commands for execution. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Identify all SmarterMail instances and versions in your environment; isolate affected systems from untrusted networks if possible. Within 7 days: Implement network-level controls (WAF rules, IP whitelisting) to restrict ConnectToHub API access; monitor logs for exploitation attempts. …

Sign in for detailed remediation steps.

Priority Score

128
Low Medium High Critical
KEV: +50
EPSS: +29.3
CVSS: +49
POC: 0

Share

CVE-2026-24423 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy