CVE-2026-40514 PUBLISHED

SmarterTools SmarterMail < Build 9610 Cryptographic Weakness via Weak RNG

Assigner: VulnCheck
Reserved: 13.04.2026 Published: 27.04.2026 Updated: 27.04.2026

SmarterTools SmarterMail builds prior to 9610 contain a cryptographic weakness in the file and email sharing endpoints that use DES-CBC encryption with keys and initialization vectors derived from System.Random seeded with insufficient entropy, reducing the seed space to approximately 19,000 possible values. An unauthenticated attacker can use the attachment download endpoint as an oracle to determine the seed in use and derive encryption keys and initialization vectors to forge sharing tokens for arbitrary emails, attachments, or file storage contents without prior access to the targeted content.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
CVSS Score: 8.2

Product Status

Vendor SmarterTools Inc.
Product SmarterMail
Versions Default: unaffected
  • affected from 0 to 100.0.9610 (excl.)

Credits

  • Maximilian Wiegand of CODE WHITE GmbH finder

References

Problem Types

  • CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) CWE