BeyondTrust Patches Critical 9.9 CVSS RCE Zero-Day in Remote Access Tools

BeyondTrust Patches Critical 9.9 CVSS Zero-Day (CVE-2026-1731) in Remote Support and Privileged Remote Access Products

CRITICAL
February 9, 2026
5m read
VulnerabilityPatch Management

Related Entities

Organizations

Products & Tech

BeyondTrust Remote SupportBeyondTrust Privileged Remote Access

Other

Harsh JaiswalHacktron AI

CVE Identifiers

CVE-2026-1731
CRITICAL
CVSS:9.9

Full Report

Executive Summary

BeyondTrust has released emergency patches for a critical zero-day vulnerability, CVE-2026-1731, found in its self-hosted (on-premise) Remote Support (RS) and Privileged Remote Access (PRA) products. The vulnerability is a pre-authentication remote code execution (RCE) flaw, earning it a near-perfect CVSSv4 score of 9.9. An unauthenticated attacker can exploit this weakness by sending a crafted request to a vulnerable appliance, allowing them to execute arbitrary OS commands with site user privileges. This could lead to a complete compromise of the appliance, data theft, or deployment of further malware. BeyondTrust has already patched its cloud-based customers, but all on-premise customers are urged to apply the updates immediately to mitigate the severe risk.

Vulnerability Details

  • CVE ID: CVE-2026-1731
  • Affected Products:
    • BeyondTrust Remote Support (RS) versions 25.3.1 and earlier (self-hosted).
    • BeyondTrust Privileged Remote Access (PRA) versions 24.3.4 and earlier (self-hosted).
  • Vulnerability Type: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection').
  • CVSS Score: 9.9 (Critical).
  • Impact: Remote Code Execution (RCE).
  • Authentication: Not required (Pre-authentication).
  • User Interaction: Not required.

An attacker can exploit this vulnerability by sending a single, specially crafted network request to the public-facing interface of a vulnerable BeyondTrust appliance. Successful exploitation allows the attacker to execute arbitrary commands on the underlying operating system of the appliance. This provides a direct foothold into a highly privileged and trusted component of an organization's IT infrastructure.

Exploitation Status

The vulnerability was discovered by researcher Harsh Jaiswal and the Hacktron AI team and responsibly disclosed to BeyondTrust. At the time of disclosure, there was no evidence of active exploitation in the wild. However, now that the vulnerability and patches are public, the risk of reverse-engineering and weaponization by threat actors is extremely high. Organizations must act on the assumption that an exploit will become publicly available soon.

Impact Assessment

BeyondTrust's products are used to manage privileged access to critical systems. A compromise of the PRA or RS appliance itself is a worst-case scenario:

  • Complete System Compromise: An attacker could gain full control over the BeyondTrust appliance, effectively owning the "keys to the kingdom."
  • Privilege Escalation: From the compromised appliance, an attacker could potentially intercept, hijack, or initiate privileged sessions to any server or endpoint managed by the tool.
  • Data Theft: The attacker could steal credentials, session recordings, and other sensitive data stored on or passing through the appliance.
  • Lateral Movement: The compromised appliance serves as a perfect launchpad for moving laterally across the entire enterprise network, as it is a trusted system with connections to many other critical assets.
  • Malware Deployment: The appliance could be used to deploy ransomware or other malware to all connected endpoints.

Detection Methods

  • Version Checking: The most straightforward detection method is to check the version of your on-premise BeyondTrust appliances. If you are running an affected version, you are vulnerable.
  • Log Analysis: BeyondTrust advises customers to review appliance logs for indicators of compromise. Security teams should hunt for any log entries showing unusual or unexpected commands being executed by the site user account.
  • Network Monitoring: Analyze web access logs for the appliance, looking for unusual inbound requests or requests that do not conform to the normal API or user traffic patterns. Any malformed or strange-looking requests should be investigated.

Remediation Steps

  • Patch Immediately: This is an urgent and critical requirement. All customers with self-hosted instances must upgrade to the patched versions as soon as possible:
    • Remote Support (RS): Upgrade to version 25.3.2 (Patch BT26-02-RS) or later.
    • Privileged Remote Access (PRA): Upgrade to version 25.1.1 (Patch BT26-02-PRA) or later.
  • Cloud Customers: No action is required for customers using BeyondTrust's cloud or SaaS offerings, as these instances have already been patched by the vendor.
  • Restrict Access: As a temporary compensating control if patching is delayed, restrict network access to the appliance's management interface. Ensure it is not exposed to the public internet and is only accessible from a limited set of trusted internal IP addresses. This reduces the attack surface but does not eliminate the vulnerability.

Timeline of Events

1
February 2, 2026
BeyondTrust patches its cloud and SaaS instances against CVE-2026-1731.
2
February 9, 2026
BeyondTrust publicly discloses CVE-2026-1731 and releases patches for on-premise customers.
3
February 9, 2026
This article was published

MITRE ATT&CK Mitigations

Applying the security patches provided by BeyondTrust is the only way to remediate the vulnerability.

Mapped D3FEND Techniques:

Restricting network access to the appliance's management interface from the internet significantly reduces the attack surface.

Mapped D3FEND Techniques:

Audit

M1047enterprise

Auditing appliance logs for signs of compromise is crucial for post-patch incident response.

D3FEND Defensive Countermeasures

Given the 9.9 CVSS score and pre-authentication RCE nature of CVE-2026-1731, the only acceptable course of action is to apply the patches from BeyondTrust immediately. This is a fire-drill situation for any organization with a self-hosted appliance. Administrators must immediately identify all on-premise Remote Support and Privileged Remote Access appliances and upgrade them to the recommended patched versions (RS 25.3.2 or PRA 25.1.1). Due to the criticality, this should bypass normal patch cycle testing and be deployed as an emergency change. Delaying this patch is an explicit acceptance of the risk of a full appliance compromise. After patching, organizations must proceed with the assumption that they may have been compromised pre-patch and initiate a threat hunt based on BeyondTrust's guidance.

As a critical defense-in-depth measure, the network interfaces of BeyondTrust appliances should be protected by strict inbound traffic filtering. The management interface should never be exposed directly to the public internet. Firewall ACLs should be configured to only allow access from a small whitelist of trusted IP addresses, such as an internal administrative VLAN or specific jump boxes. For the public-facing components required for remote users to connect, a Web Application Firewall (WAF) should be placed in front of the appliance. A WAF can be configured with rules to inspect incoming requests for patterns associated with OS command injection, potentially blocking an exploit attempt for CVE-2026-1731 before it reaches the vulnerable appliance. This layered defense reduces the likelihood of exploitation and provides an additional layer of protection against future zero-day vulnerabilities.

Sources & References

Cybersecurity News
WIU Cybersecurity (wiu.edu) February 9, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

BeyondTrustCVE-2026-1731Zero-DayRCEVulnerabilityPatch ManagementPAM

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading