Source: Ministry of education information & communication security contingency platform
"" "" ""
| Publication Number | TACERT-ANA-2026020302024747 | Publication Time | 2026/02/03 14:52 |
| Incident Type | ANA-Vulnerability Alert | Discovery Time | 2026/02/03 14:52 |
| Impact Level | Low | ||
| [Subject] 【Vulnerability Alert】CISA Adds Seven Known Exploited Vulnerabilities to the KEV Catalog (2026/01/26–2026/02/01) |
|||
|
[Content] 【Whether Ransomware Exploitation Occurred: Unknown】 An integer overflow vulnerability exists in the create_elf_tables() function in the Linux Kernel. This vulnerability may allow an unprivileged local user with access to SUID (or other privileged) binaries to escalate privileges. 【CVE-2025-52691】SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability (CVSS v3.1: 10.0) 【Whether Ransomware Exploitation Occurred: Unknown】 An unrestricted upload of file with dangerous type vulnerability exists in SmarterTools SmarterMail. This vulnerability may allow unauthenticated attackers to upload arbitrary files to any location on the mail server, potentially leading to remote code execution. 【CVE-2026-23760】SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability (CVSS v3.1: 9.8) 【Whether Ransomware Exploitation Occurred: Unknown】 An authentication bypass vulnerability exists in the password reset API of SmarterTools SmarterMail. The force-reset-password endpoint allows anonymous requests and does not verify the existing password or reset token when resetting the system administrator account. An unauthenticated attacker only needs to provide the target administrator username and a new password to reset the account, thereby resulting in full compromise of the SmarterMail instance. 【CVE-2026-24061】GNU InetUtils Argument Injection Vulnerability (CVSS v3.1: 9.8) 【Whether Ransomware Exploitation Occurred: Unknown】 An argument injection vulnerability exists in telnetd of GNU InetUtils. An attacker can set the USER environment variable to “-f root” to achieve remote authentication bypass. 【CVE-2026-21509】Microsoft Office Security Feature Bypass Vulnerability (CVSS v3.1: 7.8) 【Whether Ransomware Exploitation Occurred: Unknown】 A security feature bypass vulnerability exists in Microsoft Office. This vulnerability stems from reliance on untrusted input during security decision-making, which may allow unauthorized attackers to bypass local security protection mechanisms. Some affected products may have reached End of Life (EoL) and/or End of Service (EoS). Users are advised to stop using these products and migrate to supported versions. 【CVE-2026-24858】Fortinet Multiple Products Authentication Bypass Using an Alternate Path or Channel Vulnerability (CVSS v3.1: 9.8) 【Whether Ransomware Exploitation Occurred: Unknown】 An authentication bypass vulnerability exists in Fortinet FortiAnalyzer, FortiManager, FortiOS, and FortiProxy. When FortiCloud SSO authentication is enabled on affected devices, attackers who possess a FortiCloud account and registered devices may log in to devices that are registered under other accounts. 【CVE-2026-1281】Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability (CVSS v3.1: 9.8) 【Whether Ransomware Exploitation Occurred: Unknown】 A code injection vulnerability exists in Ivanti Endpoint Manager Mobile (EPMM), which may allow attackers to achieve remote code execution without authentication." |
|||
|
[Affected Platform] Linux kernel versions 2.6.0 to 2.6.39.4 Linux kernel versions 3.10 to 3.10.102 Linux kernel versions 4.14 to 4.14.54 【CVE-2025-52691】 SmarterTools SmarterMail versions prior to Build 9413 【CVE-2026-23760】 SmarterTools SmarterMail versions prior to Build 9511 【CVE-2026-24061】 Please refer to the affected versions listed in the official advisory: https://lists.gnu.org/archive/html/bug-inetutils/2026-01/msg00004.html 【CVE-2026-21509】 Please refer to the affected versions listed in the official advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21509 【CVE-2026-24858】 Please refer to the affected versions listed in the official advisory: https://fortiguard.fortinet.com/psirt/FG-IR-26-060 【CVE-2026-1281】 Please refer to the affected versions listed in the official advisory: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340" |
|||
|
[Recommended Actions] 【CVE-2025-52691】 Upgrade the affected product to the following version (or later): SmarterMail Build 9413 【CVE-2026-23760】 Upgrade the affected product to the following version (or later): SmarterMail Build 9511 【CVE-2026-24061】 The vendor has released a security fix for this vulnerability. Please update to the appropriate version as specified in the official advisory: https://lists.gnu.org/archive/html/bug-inetutils/2026-01/msg00004.html 【CVE-2026-21509】 The vendor has released a security fix for this vulnerability. Please update to the appropriate version as specified in the official advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21509 【CVE-2026-24858】 The vendor has released a security fix for this vulnerability. Please update to the appropriate version as specified in the official advisory: https://fortiguard.fortinet.com/psirt/FG-IR-26-060 【CVE-2026-1281】 The vendor has released a security fix for this vulnerability. Please update to the appropriate version as specified in the official advisory: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340 |
|||
| [Reference] |
|||