Home

Description

SmarterTools SmarterMail builds prior to 9610 contain a cryptographic weakness in the file and email sharing endpoints that use DES-CBC encryption with keys and initialization vectors derived from System.Random seeded with insufficient entropy, reducing the seed space to approximately 19,000 possible values. An unauthenticated attacker can use the attachment download endpoint as an oracle to determine the seed in use and derive encryption keys and initialization vectors to forge sharing tokens for arbitrary emails, attachments, or file storage contents without prior access to the targeted content.

PUBLISHED Reserved 2026-04-13 | Published 2026-04-27 | Updated 2026-04-27 | Assigner VulnCheck




HIGH: 8.2CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

MEDIUM: 5.9CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)

Product status

Default status
unaffected

Any version before 100.0.9610
affected

Credits

Maximilian Wiegand of CODE WHITE GmbH finder

References

www.smartertools.com/smartermail/release-notes/current release-notes patch

www.vulncheck.com/...610-cryptographic-weakness-via-weak-rng third-party-advisory

cve.org (CVE-2026-40514)

nvd.nist.gov (CVE-2026-40514)

Download JSON