Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Security Flaw Patched in BeyondTrust Products

Critical Security Flaw Patched in BeyondTrust Products

Posted on February 9, 2026 By CWS

BeyondTrust has issued significant updates to rectify a severe security vulnerability identified in its Remote Support (RS) and Privileged Remote Access (PRA) applications. Exploiting this flaw could potentially lead to remote code execution (RCE), posing a substantial risk to affected systems.

Understanding the Vulnerability

The security flaw, detailed by BeyondTrust in an advisory on February 6, 2026, involves a pre-authentication RCE vulnerability that impacts certain versions of RS and PRA. This issue, labeled as CVE-2026-1731, has been rated 9.9 on the CVSS scale, indicating its critical nature. The flaw allows unauthenticated attackers to send maliciously crafted requests, enabling them to execute system commands with the same privileges as the site user.

Affected Versions and Patches

The vulnerability targets Remote Support versions 25.3.1 and earlier, as well as Privileged Remote Access versions 24.3.4 and earlier. BeyondTrust has released patches to address this issue in Remote Support version 25.3.2 and later, and Privileged Remote Access version 25.1.1 and later. The company has stressed the importance of applying these patches promptly to mitigate potential risks.

Manual Update Recommendations

BeyondTrust advises self-hosted users of both RS and PRA to manually implement the updates if their systems do not automatically receive them. Those operating Remote Support versions older than 21.3 or Privileged Remote Access versions older than 22.1 must upgrade to a newer release to apply the necessary patches. The company also highlighted that users of PRA should consider upgrading to version 25.1.1 or newer to fully address the vulnerability.

Harsh Jaiswal, a security researcher and co-founder of Hacktron AI, identified the flaw on January 31, 2026, using AI-driven variant analysis. He reported approximately 11,000 exposed instances on the internet, with around 8,500 being on-premise deployments that remain at risk if patches are not installed.

Importance of Timely Updates

Given BeyondTrust’s history of vulnerabilities being actively exploited, it is crucial for users to update their systems promptly. By doing so, they can ensure robust protection against potential unauthorized access, data breaches, and service disruptions.

As cybersecurity threats continue to evolve, consistently applying security patches remains a vital defense strategy for organizations relying on BeyondTrust’s remote access solutions.

The Hacker News Tags:BeyondTrust, critical update, CVE-2026-1731, Cybersecurity, data security, enterprise security, IT security, network security, Privileged Remote Access, RCE vulnerability, Remote Support, security patch, software update, system protection, vulnerability fix

Post navigation

Previous Post: Detecting Ransomware with Windows Minifilter Technology
Next Post: New Insights on Optimizing KEV Catalog Usage for Security

Related Posts

FBI and Europol Disrupt Lumma Stealer Malware Network Linked to 10 Million Infections FBI and Europol Disrupt Lumma Stealer Malware Network Linked to 10 Million Infections The Hacker News
U.S. Dismantles DanaBot Malware Network, Charges 16 in M Global Cybercrime Operation U.S. Dismantles DanaBot Malware Network, Charges 16 in $50M Global Cybercrime Operation The Hacker News
How to Protect Your Backups How to Protect Your Backups The Hacker News
U.S. DoJ Seizes Fraud Domain Behind .6 Million Bank Account Takeover Scheme U.S. DoJ Seizes Fraud Domain Behind $14.6 Million Bank Account Takeover Scheme The Hacker News
Konni Hackers Deploy AI-Generated PowerShell Backdoor Against Blockchain Developers Konni Hackers Deploy AI-Generated PowerShell Backdoor Against Blockchain Developers The Hacker News
Cisco Warns of Active Attacks Exploiting Unpatched 0-Day in AsyncOS Email Security Appliances Cisco Warns of Active Attacks Exploiting Unpatched 0-Day in AsyncOS Email Security Appliances The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Spear-Phishing Campaign Targets Uzbekistan and Russia
  • ScarCruft Exploits Cloud Services in New Malware Campaign
  • New Tool Exploits Windows Service Recovery for Cyber Attacks
  • TeamPCP Exploits Cloud Vulnerabilities for Cybercrime
  • Vortex Werewolf Targets Russian Networks with Tor

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Spear-Phishing Campaign Targets Uzbekistan and Russia
  • ScarCruft Exploits Cloud Services in New Malware Campaign
  • New Tool Exploits Windows Service Recovery for Cyber Attacks
  • TeamPCP Exploits Cloud Vulnerabilities for Cybercrime
  • Vortex Werewolf Targets Russian Networks with Tor

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark