Powered by MOMENTUMMEDIA
For breaking news and daily updates, subscribe to our newsletter

Breached: SmarterMail authentication bypass vulnerability exploited more than 1,000 times in two weeks

CVE-2026-24423 was disclosed three weeks ago, but hackers are making hay while the sun shines, and the vulnerability remains unpatched.

Wed, 11 Feb 2026
Breached: SmarterMail authentication bypass vulnerability exploited more than 1,000 times in two weeks

SmarterTools’ very bad, no good time with its SmarterMail email management platform continues, with cyber security analysts observing the continued exploitation of unpatched installs.

CVE-2026-24423 – an unauthenticated remote code execution vulnerability in SmarterMail’s ConnectToHub API method – was disclosed more than two weeks ago, and added to the US Cybersecurity and Infrastructure Security Agency’s Known Exploited Vulnerabilities Catalog on February 6.

However, despite continued coverage, hackers are still having a field day with the vulnerability, according to cyber security firm watchTowr's Head of Proactive Threat Intelligence, Ryan Dewhurst.

 
 

“Mass exploitation of CVE-2026-24423 kicked off on January 28th. Since then, watchTowr has observed over 1,000 exploitation attempts originating from approximately 60 unique attacker IPs and has identified multiple huAddress URLs used for out-of-band callbacks,” Dewhurst told Cyber Daily.

“A consistent marker in these requests is the nodeName field, often set to victim-$unix_epoch. It appears to be a simple yet effective way for attackers to label victims and link callbacks – nothing fancy, but it works.”

What makes the ongoing exploitation particularly interesting is the timing of the exploitation, which suggests threat actors are only working nine-to-five workdays.

“The pattern also reveals itself. Exploitation has remained consistently steady since it was first observed, with one clear exception: weekends. Activity drops sharply and then quickly picks up again at the start of the workweek,” Dewhurst said.

“It appears mostly driven by operators during business hours. Either way, exploitation is ongoing, repeatable, and remains predictable.

Whether this suggests nation-state activity or simply criminal actors with an organised workflow remains to be seen. Regardless, at this stage, Dewhurst said network defenders should fear the worst.

“If you’re not already patched, you should probably assume you've been compromised. Even the vendor itself was caught off guard with an out-of-date server getting hit,” Dewhurst said.

“If the people shipping the fix can miss it, nobody gets a free pass.”

David Hollingworth

David Hollingworth

David Hollingworth has been writing about technology for over 20 years, and has worked for a range of print and online titles in his career. He is enjoying getting to grips with cyber security, especially when it lets him talk about Lego.

Tags:
You need to be a member to post comments. Become a member for free today!