BeyondTrust has released emergency patches for a critical zero-day vulnerability, CVE-2026-1731, found in its self-hosted (on-premise) Remote Support (RS) and Privileged Remote Access (PRA) products. The vulnerability is a pre-authentication remote code execution (RCE) flaw, earning it a near-perfect CVSSv4 score of 9.9. An unauthenticated attacker can exploit this weakness by sending a crafted request to a vulnerable appliance, allowing them to execute arbitrary OS commands with site user privileges. This could lead to a complete compromise of the appliance, data theft, or deployment of further malware. BeyondTrust has already patched its cloud-based customers, but all on-premise customers are urged to apply the updates immediately to mitigate the severe risk.
An attacker can exploit this vulnerability by sending a single, specially crafted network request to the public-facing interface of a vulnerable BeyondTrust appliance. Successful exploitation allows the attacker to execute arbitrary commands on the underlying operating system of the appliance. This provides a direct foothold into a highly privileged and trusted component of an organization's IT infrastructure.
The vulnerability was discovered by researcher Harsh Jaiswal and the Hacktron AI team and responsibly disclosed to BeyondTrust. At the time of disclosure, there was no evidence of active exploitation in the wild. However, now that the vulnerability and patches are public, the risk of reverse-engineering and weaponization by threat actors is extremely high. Organizations must act on the assumption that an exploit will become publicly available soon.
BeyondTrust's products are used to manage privileged access to critical systems. A compromise of the PRA or RS appliance itself is a worst-case scenario:
site user account.BeyondTrust RCE flaw (CVE-2026-1731) is now under active exploitation, prompting CISA to add it to the KEV catalog with an urgent patch deadline.
The critical BeyondTrust RCE vulnerability (CVE-2026-1731) is now being actively exploited in the wild, a significant escalation from its initial disclosure. Following the public release of a proof-of-concept (PoC) exploit on February 10, 2026, widespread scanning and exploitation attempts have been observed. Consequently, CISA has added CVE-2026-1731 to its Known Exploited Vulnerabilities (KEV) catalog on February 13, 2026, mandating federal agencies to patch by February 16, 2026. This development underscores the urgent need for all on-premises BeyondTrust users to apply patches immediately to prevent system compromise.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats