Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Showing posts with label KEV. Show all posts

CISA Warns of Actively Exploited SmarterMail Flaw Used in Ransomware Attacks

 

CISA includes a fresh SmarterMail weakness in its KEV list - this marks the third such addition linked to the messaging system within fourteen days. Identified as CVE-2026-24423, the security gap faces real-world abuse during ransom operations. Evidence points to sustained interest in compromising SmarterTools’ broadly adopted software suite. 

Another entry joins a pair of prior SmarterMail flaws listed in the KEV database since January 26. One was tagged CVE-2025-52691 - marked by unchecked uploads of hazardous files. The second, assigned CVE-2026-23760, let attackers skip login checks entirely. Analysis came first from experts at watchTowr, who unpacked how each could be triggered. Once those specifics emerged, several security teams observed active attacks; the login flaw saw more frequent abuse. Although both were dissected publicly, it was the broken verification that drew wider misuse. 

A security issue labeled CVE-2026-24423 arises because a key part of SmarterMail - the ConnectToHub API - lacks proper access checks. Versions before v100.0.9511 are exposed, letting outsiders run harmful code remotely. Instead of requiring login details, hackers exploit it by submitting a modified POST message. This leads to direct command control on the target machine through intentional input manipulation. 

Separate findings came from teams at watchTowr, CODE WHITE GmbH, and VulnCheck. As noted by Cale Black of VulnCheck, the affected endpoint skips any login checks - opening a way to set up server directory links remotely. Because that setup pulls instructions directly from an outside machine under attacker influence, control is effectively handed over. Those instructions appear as support routines inside the system. Once SmarterMail reads them, they run unchecked on whatever platform hosts the software. 

Starting at the ConnectToHub endpoint, the process handles a remote address sent via one particular parameter. Afterward, communication initiates from the SmarterMail server toward a machine controlled by the attacker. That system replies - not with ordinary data - but with settings containing command inputs meant to run. Provided minimal checks are satisfied, execution follows without further barriers. Control over the compromised environment expands widely under these conditions. 

By February 26, 2026, U.S. federal civilian agencies must fix the vulnerability - this stems from ongoing attacks involving ransomware. Though only binding for federal bodies, its listing in CISA’s KEV catalog hints at wider exposure across any organization using affected SmarterMail versions. Not just government systems face potential harm; real-world misuse raises stakes beyond official mandates. 

Right now, updating to the newest SmarterMail release is a top priority, according to analysts watching threats closely. Instead of waiting, teams managing large systems should examine log data - especially activity tied to the open ConnectToHub interface, since probes might show up as odd patterns in API traffic. What stands out is how quickly multiple flaws in SmarterMail entered official exploit databases, signaling that delays in patching could lead to real breaches. Because of this, those overseeing network access must act fast while rethinking how exposed their mail platforms really are.

CISA Confirms Active Exploitation of Four Critical Enterprise Software Flaws

 

CISA has confirmed active exploitation of four critical vulnerabilities in widely used enterprise software, urging immediate action from federal agencies and organizations worldwide. These flaws, now added to the agency's Known Exploited Vulnerabilities (KEV) catalog, affect products from Versa, Zimbra, Vite, and Prettier, with evidence of real-world attacks underway. As cyber threats escalate in 2026, this development highlights the urgent need for swift patching to safeguard networks.

The first vulnerability, CVE-2025-31125, is a high-severity improper access control issue in the Vite frontend tooling framework. It allows attackers to expose non-allowed files if the server is exposed to the network, primarily impacting development instances . Patched in versions 6.2.4, 6.1.3, 6.0.13, 5.4.16, and 4.5.11, this flaw underscores the risks of misconfigured dev environments in production-like setups.

CVE-2025-34026 represents a critical authentication bypass in Versa Concerto SD-WAN orchestration platform, versions 12.1.2 through 12.2.0. Stemming from a Traefik reverse proxy misconfiguration, it grants unauthorized access to admin endpoints, including sensitive heap dumps and trace logs . Discovered by ProjectDiscovery in February 2025 and fixed by March, it exposes enterprises relying on SD-WAN to potential data leaks and deeper intrusions.

A supply-chain attack targeted the eslint-config-prettier package via CVE-2025-54313, compromising npm versions 8.10.1, 9.1.1, 10.1.6, and 10.1.7. Malicious install scripts deployed node-gyp.dll payloads on Windows to steal npm tokens, affecting developers using ESLint and Prettier for code formatting . This incident reveals the growing dangers of dependency hijacking in open-source ecosystems.

Finally, CVE-2025-68645 is a local file inclusion flaw in Zimbra Collaboration Suite 10.0 and 10.1's Webmail Classic UI. Unauthenticated attackers exploit the /h/rest endpoint due to poor parameter handling in the RestFilter servlet, reading arbitrary WebRoot files . CISA mandates federal agencies to patch by February 12, 2026, or discontinue use, emphasizing proactive vulnerability management amid unknown ransomware links.