CISA Adds Four Vulnerabilities to KEV Catalog Including Critical SmarterMail Authentication Bypass

CISA Adds Four Vulnerabilities to KEV Catalog Including Critical SmarterMail Authentication Bypass

CISA has added four vulnerabilities to its Known Exploited Vulnerabilities catalog, including two critical flaws in SmarterTools SmarterMail that could allow unauthenticated attackers to achieve full administrative compromise of mail servers. Federal agencies must apply mitigations by February 16, 2026.

Critical SmarterMail Authentication Bypass

The most severe addition is CVE-2026-23760, an authentication bypass vulnerability in SmarterMail's password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or reset token when resetting system administrator accounts.

This allows an unauthenticated attacker to supply a target administrator username and new password to reset the account, resulting in complete administrative takeover of the SmarterMail instance. The vulnerability is classified as CWE-288: Authentication Bypass Using an Alternate Path or Channel.

SmarterMail Arbitrary File Upload

The second SmarterMail vulnerability, CVE-2025-52691, enables unrestricted upload of dangerous file types. An unauthenticated attacker can upload arbitrary files to any location on the mail server, potentially enabling remote code execution. The flaw is classified as CWE-434.

Organizations running SmarterMail should apply patches immediately as both vulnerabilities can be exploited without authentication and provide significant access to compromised systems.

GNU InetUtils Telnet Authentication Bypass

CVE-2026-24061 affects GNU InetUtils telnetd, containing an argument injection vulnerability that enables remote authentication bypass. Attackers can bypass authentication by supplying a "-f root" value for the USER environment variable, classified as CWE-88: Argument Injection.

This vulnerability affects an open-source component used across multiple products. Organizations should check with specific vendors for patching status and consider disabling telnetd where not required.

Legacy Linux Kernel Vulnerability

CISA also added CVE-2018-14634, an integer overflow vulnerability in the Linux kernel's create_elf_tables() function dating from 2018. The flaw allows an unprivileged local user with access to SUID or otherwise privileged binaries to escalate privileges on the system.

The addition of this older vulnerability indicates active exploitation has been observed in the wild. Organizations should verify their Linux systems are patched against this CWE-190 integer overflow vulnerability.

Remediation Timeline

All four vulnerabilities have a remediation due date of February 16, 2026. Federal agencies are required to apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of affected products if mitigations are unavailable.

None of the vulnerabilities have confirmed links to ransomware campaigns at this time.

Read more

ClickFix Campaign Compromises Legitimate Sites to Deploy MIMICRAT — A Custom C++ RAT With 22 Post-Exploitation Commands

ClickFix Campaign Compromises Legitimate Sites to Deploy MIMICRAT — A Custom C++ RAT With 22 Post-Exploitation Commands

Elastic Security Labs has disclosed a new ClickFix campaign that leverages compromised legitimate websites as delivery infrastructure to deploy a previously undocumented remote access trojan dubbed MIMICRAT (also tracked as AstarionRAT). The campaign, discovered earlier this month, demonstrates significant operational sophistication — from multi-stage PowerShell chains that bypass Windows security controls

By Zero Day Wire
ShinyHunters Linked to Device Code Vishing Attacks Targeting Microsoft Entra Accounts via OAuth 2.0 Abuse

ShinyHunters Linked to Device Code Vishing Attacks Targeting Microsoft Entra Accounts via OAuth 2.0 Abuse

A new wave of attacks is combining voice phishing (vishing) with OAuth 2.0 device authorization abuse to compromise Microsoft Entra accounts at technology, manufacturing, and financial organizations — bypassing traditional phishing infrastructure entirely. Sources told BleepingComputer they believe the ShinyHunters extortion gang is behind the campaigns, which the threat actors

By Zero Day Wire