Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Vulnerability in BeyondTrust Allows Remote Code Execution

Critical Vulnerability in BeyondTrust Allows Remote Code Execution

Posted on February 7, 2026 By CWS

A newly disclosed critical vulnerability in BeyondTrust’s Remote Support (RS) and Privileged Remote Access (PRA) platforms poses a significant risk to numerous organizations globally. This flaw, identified as CVE-2026-1731, allows unauthenticated remote code execution and is categorized under CWE-78, commonly known as OS Command Injection.

Understanding the Vulnerability

The vulnerability enables attackers to execute arbitrary system commands without requiring authentication or user engagement. By sending specially crafted requests, malicious actors can exploit this flaw to trigger command execution within the vulnerable BeyondTrust systems.

This poses a significant threat as it eliminates the need for prior access credentials or social engineering, making it a prime target for attackers aiming to infiltrate enterprise remote access infrastructures. The potential consequences include unauthorized access to sensitive information, disruption of critical services, and possible lateral movement within the network.

Impacted Versions and Immediate Actions

The vulnerability affects Remote Support versions 25.3.1 and earlier, as well as Privileged Remote Access versions 24.3.4 and older. Organizations using these versions are urged to take swift action to secure their systems.

BeyondTrust has already deployed automatic patches for SaaS customers as of February 2, 2026. For those with self-hosted deployments, immediate manual patch application is necessary. Remote Support users should apply patch BT26-02-RS, while Privileged Remote Access users need patch BT26-02-PRA through their /appliance interface if automatic updates are not active.

Preventive Measures and Future Outlook

Customers with older versions, specifically Remote Support older than 21.3 and Privileged Remote Access older than 22.1, must upgrade to a supported version before applying the security patches. Alternatively, self-hosted PRA users can upgrade to version 25.1.1 or later, and Remote Support users to version 25.3.2 or beyond for full protection.

The vulnerability was identified by Harsh Jaiswal and the Hacktron AI team, who used advanced AI-enabled variant analysis techniques. BeyondTrust praised their responsible disclosure, which allowed the company to develop and distribute patches before any public exploitation.

Organizations utilizing affected BeyondTrust products should prioritize these security updates to mitigate the risk of exploitation. Stay informed with our updates on Google News, LinkedIn, and X for the latest in cybersecurity developments.

Cyber Security News Tags:BeyondTrust, CVE-2026-1731, Cybersecurity, enterprise security, OS command injection, patch management, privileged access management, remote access, remote code execution, Vulnerability

Post navigation

Previous Post: Ransomware Disrupts BridgePay’s Nationwide Payment Processing

Related Posts

Phishing Alert: Fake Party Invites Install Remote Access Software Phishing Alert: Fake Party Invites Install Remote Access Software Cyber Security News
UAC-0001 Hackers Attacking ICS Devices Running Windows Systems as a Server UAC-0001 Hackers Attacking ICS Devices Running Windows Systems as a Server Cyber Security News
New Hpingbot Abusing Pastebin for Payload Delivery and Hping3 Tool to Launch DDoS Attacks New Hpingbot Abusing Pastebin for Payload Delivery and Hping3 Tool to Launch DDoS Attacks Cyber Security News
Threat Actors Attacking Fans and Teams of Belgian Grand Prix With Phishing Campaigns Threat Actors Attacking Fans and Teams of Belgian Grand Prix With Phishing Campaigns Cyber Security News
SparkKitty Attacks iOS and Android Devices in Wild Via App Store and Google Play SparkKitty Attacks iOS and Android Devices in Wild Via App Store and Google Play Cyber Security News
Trend Micro Apex One Vulnerability Allow Attackers to Inject Malicious Code Trend Micro Apex One Vulnerability Allow Attackers to Inject Malicious Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Vulnerability in BeyondTrust Allows Remote Code Execution
  • Ransomware Disrupts BridgePay’s Nationwide Payment Processing
  • German Agencies Issue Alert on Signal Phishing Threat
  • State-Backed Hackers Exploit Signal to Target Officials
  • Urgent Replacement of Discontinued Edge Devices Advised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Vulnerability in BeyondTrust Allows Remote Code Execution
  • Ransomware Disrupts BridgePay’s Nationwide Payment Processing
  • German Agencies Issue Alert on Signal Phishing Threat
  • State-Backed Hackers Exploit Signal to Target Officials
  • Urgent Replacement of Discontinued Edge Devices Advised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark