Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Vulnerability in BeyondTrust Allows Remote Code Execution

Critical Vulnerability in BeyondTrust Allows Remote Code Execution

Posted on February 7, 2026 By CWS

A newly disclosed critical vulnerability in BeyondTrust’s Remote Support (RS) and Privileged Remote Access (PRA) platforms poses a significant risk to numerous organizations globally. This flaw, identified as CVE-2026-1731, allows unauthenticated remote code execution and is categorized under CWE-78, commonly known as OS Command Injection.

Understanding the Vulnerability

The vulnerability enables attackers to execute arbitrary system commands without requiring authentication or user engagement. By sending specially crafted requests, malicious actors can exploit this flaw to trigger command execution within the vulnerable BeyondTrust systems.

This poses a significant threat as it eliminates the need for prior access credentials or social engineering, making it a prime target for attackers aiming to infiltrate enterprise remote access infrastructures. The potential consequences include unauthorized access to sensitive information, disruption of critical services, and possible lateral movement within the network.

Impacted Versions and Immediate Actions

The vulnerability affects Remote Support versions 25.3.1 and earlier, as well as Privileged Remote Access versions 24.3.4 and older. Organizations using these versions are urged to take swift action to secure their systems.

BeyondTrust has already deployed automatic patches for SaaS customers as of February 2, 2026. For those with self-hosted deployments, immediate manual patch application is necessary. Remote Support users should apply patch BT26-02-RS, while Privileged Remote Access users need patch BT26-02-PRA through their /appliance interface if automatic updates are not active.

Preventive Measures and Future Outlook

Customers with older versions, specifically Remote Support older than 21.3 and Privileged Remote Access older than 22.1, must upgrade to a supported version before applying the security patches. Alternatively, self-hosted PRA users can upgrade to version 25.1.1 or later, and Remote Support users to version 25.3.2 or beyond for full protection.

The vulnerability was identified by Harsh Jaiswal and the Hacktron AI team, who used advanced AI-enabled variant analysis techniques. BeyondTrust praised their responsible disclosure, which allowed the company to develop and distribute patches before any public exploitation.

Organizations utilizing affected BeyondTrust products should prioritize these security updates to mitigate the risk of exploitation. Stay informed with our updates on Google News, LinkedIn, and X for the latest in cybersecurity developments.

Cyber Security News Tags:BeyondTrust, CVE-2026-1731, Cybersecurity, enterprise security, OS command injection, patch management, privileged access management, remote access, remote code execution, Vulnerability

Post navigation

Previous Post: Ransomware Disrupts BridgePay’s Nationwide Payment Processing
Next Post: Microsoft Data Center Outage Affects Windows 11 Updates

Related Posts

CISA Releases 3 ICS Advisories Covering Vulnerabilities and Exploits CISA Releases 3 ICS Advisories Covering Vulnerabilities and Exploits Cyber Security News
New Crocodilus Malware That Gain Complete Control of Android Device New Crocodilus Malware That Gain Complete Control of Android Device Cyber Security News
Windows SMB Client Vulnerability Enables Attacker to Own Active Directory Windows SMB Client Vulnerability Enables Attacker to Own Active Directory Cyber Security News
New Spiderman Phishing Kit Lets Attackers Create Malicious Bank Login Pages in Few Clicks New Spiderman Phishing Kit Lets Attackers Create Malicious Bank Login Pages in Few Clicks Cyber Security News
Top 10 Best Practices for Securing Your Database Top 10 Best Practices for Securing Your Database Cyber Security News
Critical Linux Vulnerabilities Expose Password Hashes on Millions of Linux Systems Worldwide Critical Linux Vulnerabilities Expose Password Hashes on Millions of Linux Systems Worldwide Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News