Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Vulnerability in BeyondTrust Allows Remote Code Execution

Critical Vulnerability in BeyondTrust Allows Remote Code Execution

Posted on February 7, 2026 By CWS

A newly disclosed critical vulnerability in BeyondTrust’s Remote Support (RS) and Privileged Remote Access (PRA) platforms poses a significant risk to numerous organizations globally. This flaw, identified as CVE-2026-1731, allows unauthenticated remote code execution and is categorized under CWE-78, commonly known as OS Command Injection.

Understanding the Vulnerability

The vulnerability enables attackers to execute arbitrary system commands without requiring authentication or user engagement. By sending specially crafted requests, malicious actors can exploit this flaw to trigger command execution within the vulnerable BeyondTrust systems.

This poses a significant threat as it eliminates the need for prior access credentials or social engineering, making it a prime target for attackers aiming to infiltrate enterprise remote access infrastructures. The potential consequences include unauthorized access to sensitive information, disruption of critical services, and possible lateral movement within the network.

Impacted Versions and Immediate Actions

The vulnerability affects Remote Support versions 25.3.1 and earlier, as well as Privileged Remote Access versions 24.3.4 and older. Organizations using these versions are urged to take swift action to secure their systems.

BeyondTrust has already deployed automatic patches for SaaS customers as of February 2, 2026. For those with self-hosted deployments, immediate manual patch application is necessary. Remote Support users should apply patch BT26-02-RS, while Privileged Remote Access users need patch BT26-02-PRA through their /appliance interface if automatic updates are not active.

Preventive Measures and Future Outlook

Customers with older versions, specifically Remote Support older than 21.3 and Privileged Remote Access older than 22.1, must upgrade to a supported version before applying the security patches. Alternatively, self-hosted PRA users can upgrade to version 25.1.1 or later, and Remote Support users to version 25.3.2 or beyond for full protection.

The vulnerability was identified by Harsh Jaiswal and the Hacktron AI team, who used advanced AI-enabled variant analysis techniques. BeyondTrust praised their responsible disclosure, which allowed the company to develop and distribute patches before any public exploitation.

Organizations utilizing affected BeyondTrust products should prioritize these security updates to mitigate the risk of exploitation. Stay informed with our updates on Google News, LinkedIn, and X for the latest in cybersecurity developments.

Cyber Security News Tags:BeyondTrust, CVE-2026-1731, Cybersecurity, enterprise security, OS command injection, patch management, privileged access management, remote access, remote code execution, Vulnerability

Post navigation

Previous Post: Ransomware Disrupts BridgePay’s Nationwide Payment Processing
Next Post: Microsoft Data Center Outage Affects Windows 11 Updates

Related Posts

Booking.com Data Breach Exposes Customer Details Booking.com Data Breach Exposes Customer Details Cyber Security News
PhantomRaven Attack Involves 126 Malicious npm Packages with Over 86,000 Downloads Hiding Malicious Code PhantomRaven Attack Involves 126 Malicious npm Packages with Over 86,000 Downloads Hiding Malicious Code Cyber Security News
Qihoo 360’s SSL Key Leak: Major Security Breach Qihoo 360’s SSL Key Leak: Major Security Breach Cyber Security News
Indirect Prompt Injection Threatens AI Security Indirect Prompt Injection Threatens AI Security Cyber Security News
Microsoft to End Support for Windows Server 2016 and Windows 10 Microsoft to End Support for Windows Server 2016 and Windows 10 Cyber Security News
Microsoft’s Copilot Disclaimer Sparks Security Debate Microsoft’s Copilot Disclaimer Sparks Security Debate Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark