Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Security Flaw Patched in BeyondTrust Products

Critical Security Flaw Patched in BeyondTrust Products

Posted on February 9, 2026 By CWS

BeyondTrust has issued significant updates to rectify a severe security vulnerability identified in its Remote Support (RS) and Privileged Remote Access (PRA) applications. Exploiting this flaw could potentially lead to remote code execution (RCE), posing a substantial risk to affected systems.

Understanding the Vulnerability

The security flaw, detailed by BeyondTrust in an advisory on February 6, 2026, involves a pre-authentication RCE vulnerability that impacts certain versions of RS and PRA. This issue, labeled as CVE-2026-1731, has been rated 9.9 on the CVSS scale, indicating its critical nature. The flaw allows unauthenticated attackers to send maliciously crafted requests, enabling them to execute system commands with the same privileges as the site user.

Affected Versions and Patches

The vulnerability targets Remote Support versions 25.3.1 and earlier, as well as Privileged Remote Access versions 24.3.4 and earlier. BeyondTrust has released patches to address this issue in Remote Support version 25.3.2 and later, and Privileged Remote Access version 25.1.1 and later. The company has stressed the importance of applying these patches promptly to mitigate potential risks.

Manual Update Recommendations

BeyondTrust advises self-hosted users of both RS and PRA to manually implement the updates if their systems do not automatically receive them. Those operating Remote Support versions older than 21.3 or Privileged Remote Access versions older than 22.1 must upgrade to a newer release to apply the necessary patches. The company also highlighted that users of PRA should consider upgrading to version 25.1.1 or newer to fully address the vulnerability.

Harsh Jaiswal, a security researcher and co-founder of Hacktron AI, identified the flaw on January 31, 2026, using AI-driven variant analysis. He reported approximately 11,000 exposed instances on the internet, with around 8,500 being on-premise deployments that remain at risk if patches are not installed.

Importance of Timely Updates

Given BeyondTrust’s history of vulnerabilities being actively exploited, it is crucial for users to update their systems promptly. By doing so, they can ensure robust protection against potential unauthorized access, data breaches, and service disruptions.

As cybersecurity threats continue to evolve, consistently applying security patches remains a vital defense strategy for organizations relying on BeyondTrust’s remote access solutions.

The Hacker News Tags:BeyondTrust, critical update, CVE-2026-1731, Cybersecurity, data security, enterprise security, IT security, network security, Privileged Remote Access, RCE vulnerability, Remote Support, security patch, software update, system protection, vulnerability fix

Post navigation

Previous Post: Detecting Ransomware with Windows Minifilter Technology
Next Post: New Insights on Optimizing KEV Catalog Usage for Security

Related Posts

What Should We Learn From How Attackers Leveraged AI in 2025? What Should We Learn From How Attackers Leveraged AI in 2025? The Hacker News
6M Crypto Fine, Hacking Formula 1, Chromium Vulns, AI Hijack & More $176M Crypto Fine, Hacking Formula 1, Chromium Vulns, AI Hijack & More The Hacker News
Ghost Identities, Poisoned Accounts, & AI Agent Havoc Ghost Identities, Poisoned Accounts, & AI Agent Havoc The Hacker News
U.S. Sanctions Funnull for 0M Romance Baiting Scams Tied to Crypto Fraud U.S. Sanctions Funnull for $200M Romance Baiting Scams Tied to Crypto Fraud The Hacker News
Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program The Hacker News
Shifting from Monitoring Alerts to Measuring Risk Shifting from Monitoring Alerts to Measuring Risk The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark