Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Vulnerability in BeyondTrust Allows Remote Code Execution

Critical Vulnerability in BeyondTrust Allows Remote Code Execution

Posted on February 7, 2026 By CWS

A newly disclosed critical vulnerability in BeyondTrust’s Remote Support (RS) and Privileged Remote Access (PRA) platforms poses a significant risk to numerous organizations globally. This flaw, identified as CVE-2026-1731, allows unauthenticated remote code execution and is categorized under CWE-78, commonly known as OS Command Injection.

Understanding the Vulnerability

The vulnerability enables attackers to execute arbitrary system commands without requiring authentication or user engagement. By sending specially crafted requests, malicious actors can exploit this flaw to trigger command execution within the vulnerable BeyondTrust systems.

This poses a significant threat as it eliminates the need for prior access credentials or social engineering, making it a prime target for attackers aiming to infiltrate enterprise remote access infrastructures. The potential consequences include unauthorized access to sensitive information, disruption of critical services, and possible lateral movement within the network.

Impacted Versions and Immediate Actions

The vulnerability affects Remote Support versions 25.3.1 and earlier, as well as Privileged Remote Access versions 24.3.4 and older. Organizations using these versions are urged to take swift action to secure their systems.

BeyondTrust has already deployed automatic patches for SaaS customers as of February 2, 2026. For those with self-hosted deployments, immediate manual patch application is necessary. Remote Support users should apply patch BT26-02-RS, while Privileged Remote Access users need patch BT26-02-PRA through their /appliance interface if automatic updates are not active.

Preventive Measures and Future Outlook

Customers with older versions, specifically Remote Support older than 21.3 and Privileged Remote Access older than 22.1, must upgrade to a supported version before applying the security patches. Alternatively, self-hosted PRA users can upgrade to version 25.1.1 or later, and Remote Support users to version 25.3.2 or beyond for full protection.

The vulnerability was identified by Harsh Jaiswal and the Hacktron AI team, who used advanced AI-enabled variant analysis techniques. BeyondTrust praised their responsible disclosure, which allowed the company to develop and distribute patches before any public exploitation.

Organizations utilizing affected BeyondTrust products should prioritize these security updates to mitigate the risk of exploitation. Stay informed with our updates on Google News, LinkedIn, and X for the latest in cybersecurity developments.

Cyber Security News Tags:BeyondTrust, CVE-2026-1731, Cybersecurity, enterprise security, OS command injection, patch management, privileged access management, remote access, remote code execution, Vulnerability

Post navigation

Previous Post: Ransomware Disrupts BridgePay’s Nationwide Payment Processing
Next Post: Microsoft Data Center Outage Affects Windows 11 Updates

Related Posts

OpenSSH Vulnerability Exploited Via ProxyCommand to Execute Remote Code OpenSSH Vulnerability Exploited Via ProxyCommand to Execute Remote Code Cyber Security News
Tesla’s Telematics Control Unit Vulnerability Let Attackers Gain Code Execution as Root Tesla’s Telematics Control Unit Vulnerability Let Attackers Gain Code Execution as Root Cyber Security News
15 Best Website Monitoring Tools in 2025 15 Best Website Monitoring Tools in 2025 Cyber Security News
Google Unveils new AI-Protection for Android to Keep You Safe From Mobile Scams Google Unveils new AI-Protection for Android to Keep You Safe From Mobile Scams Cyber Security News
Hackers Exploit DNS Queries for C2 Operations and Data Exfiltration, Bypassing Traditional Defenses Hackers Exploit DNS Queries for C2 Operations and Data Exfiltration, Bypassing Traditional Defenses Cyber Security News
Microsoft Teams Issue Blocks Users From Opening Embedded Office Documents Microsoft Teams Issue Blocks Users From Opening Embedded Office Documents Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark