SmarterTools patches critical SmarterMail flaw allowing code execution

Security Affairs

Overview

SmarterTools has released patches for two vulnerabilities in its SmarterMail email software, one of which is classified as critical. This flaw, identified as CVE-2026-24423, has a CVSS score of 9.3 and could allow attackers to execute arbitrary code on systems running affected versions of SmarterMail. Users of SmarterMail versions prior to build 9511 are particularly at risk. It's crucial for organizations using this software to update immediately to protect against potential exploitation. The existence of such a high-severity vulnerability underscores the importance of regular software updates and vigilance in cybersecurity practices.

Key Takeaways

  • Affected Systems: SmarterMail versions prior to build 9511
  • Action Required: Users should update to SmarterMail build 9511 or later to mitigate the risks associated with this vulnerability.
  • Timeline: Newly disclosed

Original Article Summary

SmarterTools fixed two SmarterMail flaws, including a critical bug (CVE-2026-24423) that could allow arbitrary code execution. SmarterTools fixed two security bugs in its SmarterMail email software, including a critical vulnerability, tracked as CVE-2026-24423 (CVSS score of 9.3) that could let attackers run malicious code on affected systems. “SmarterTools SmarterMail versions prior to build 9511 contain […]

Impact

SmarterMail versions prior to build 9511

Exploitation Status

No active exploitation has been reported at this time. However, organizations should still apply patches promptly as proof-of-concept code may exist.

Timeline

Newly disclosed

Remediation

Users should update to SmarterMail build 9511 or later to mitigate the risks associated with this vulnerability.

Additional Information

This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.

Related Topics: This incident relates to CVE, Vulnerability, Patch, and 2 more.

Related Coverage

Avast brings deepfake scam detection to Windows PCs and mobile devices

Help Net Security

Avast has rolled out two new security features aimed at detecting scams involving deepfake technology. The Avast Scam Guardian and Scam Guardian Pro are now available for mobile devices, while the Avast Deepfake Guard is launched for Windows PCs. This AI-driven tool is designed to analyze and identify harmful audio that could be embedded within video content. The goal is to enhance protection for users against various scam tactics that can occur through text messages, phone calls, and video platforms. These updates are particularly relevant as the rise of deepfakes poses a growing risk to online security, making it essential for users to have reliable tools to safeguard against such threats.

Feb 4, 2026

Security Analysis of Moltbook Agent Network: Bot-to-Bot Prompt Injection and Data Leaks

SecurityWeek

Wiz and Permiso have discovered significant security vulnerabilities in the Moltbook Agent Network, which is an AI agent social network. Their analysis reveals that bot-to-bot prompt injection attacks could allow malicious bots to manipulate other bots, leading to unauthorized actions or data leaks. This poses a risk to users relying on these AI agents for various tasks, as sensitive information could be compromised. The findings indicate that these vulnerabilities could be exploited by attackers to gain control over the network and access confidential data. As AI technologies become more prevalent, it is crucial for developers to address these security flaws to protect users and maintain trust in AI systems.

Feb 4, 2026

Global Threat Map: Open-source real-time situational awareness platform

Help Net Security

The Global Threat Map is an open-source initiative designed to provide security teams with real-time visibility of cyber incidents worldwide. It aggregates various open data feeds into an interactive map that displays key indicators like malware spread, phishing attempts, and attack traffic based on geographic location. Unlike traditional threat maps, which are often produced by security vendors, this project relies on community contributions to maintain and update the data. This platform is particularly valuable for organizations looking to enhance their situational awareness and respond to emerging threats more effectively. By utilizing open-source data, it fosters collaboration among security professionals and helps them stay informed about the latest cyber activities that could impact their operations.

Feb 4, 2026

Eclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensions

The Hacker News

The Eclipse Foundation has decided to implement mandatory security checks for extensions intended for the Open VSX Registry, which is used with Microsoft Visual Studio Code (VS Code). This initiative aims to prevent malicious extensions from being published, marking a proactive shift in how the foundation addresses security risks related to supply chain attacks. By requiring these checks before publication, the foundation hopes to enhance the safety of the open-source ecosystem and protect developers and users from potentially harmful software. This change is significant as it reflects a growing awareness of the vulnerabilities associated with software supply chains, especially in widely used development tools like VS Code.

Feb 4, 2026

Ransomware surge prompts FCC guidance for stronger telecom security practices

SCM feed for Latest

The Federal Communications Commission (FCC) is urging telecom companies to enhance their cybersecurity practices in response to a rise in ransomware attacks. The FCC emphasizes that implementing basic security measures, such as regularly updating software, using multifactor authentication, and segmenting networks, can greatly reduce the risk of falling victim to these attacks. This guidance comes as ransomware continues to pose a significant threat to the telecommunications sector, which plays a crucial role in national infrastructure. By adopting these recommended practices, telecom providers can better protect sensitive customer data and ensure the reliability of their services. The FCC's advice serves as a timely reminder for the industry to stay vigilant against evolving cyber threats.

Feb 4, 2026

Denmark subjected to sweeping Russian cyberattack threats

SCM feed for Latest

Denmark is facing a significant cyber threat from a pro-Russian hacker group known as the Russian Legion. This group has declared intentions to launch large-scale cyber intrusions in response to Denmark's plans to provide military aid to Ukraine. The threat underscores the ongoing tensions between Russia and countries supporting Ukraine, marking a potential escalation in cyber warfare tactics. As Denmark prepares for these potential attacks, the government and cybersecurity agencies will need to bolster their defenses to protect critical infrastructure and sensitive data. This situation serves as a reminder of the complex relationship between geopolitical events and cybersecurity risks.

Feb 4, 2026