Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Security Flaw Patched in BeyondTrust Products

Critical Security Flaw Patched in BeyondTrust Products

Posted on February 9, 2026 By CWS

BeyondTrust has issued significant updates to rectify a severe security vulnerability identified in its Remote Support (RS) and Privileged Remote Access (PRA) applications. Exploiting this flaw could potentially lead to remote code execution (RCE), posing a substantial risk to affected systems.

Understanding the Vulnerability

The security flaw, detailed by BeyondTrust in an advisory on February 6, 2026, involves a pre-authentication RCE vulnerability that impacts certain versions of RS and PRA. This issue, labeled as CVE-2026-1731, has been rated 9.9 on the CVSS scale, indicating its critical nature. The flaw allows unauthenticated attackers to send maliciously crafted requests, enabling them to execute system commands with the same privileges as the site user.

Affected Versions and Patches

The vulnerability targets Remote Support versions 25.3.1 and earlier, as well as Privileged Remote Access versions 24.3.4 and earlier. BeyondTrust has released patches to address this issue in Remote Support version 25.3.2 and later, and Privileged Remote Access version 25.1.1 and later. The company has stressed the importance of applying these patches promptly to mitigate potential risks.

Manual Update Recommendations

BeyondTrust advises self-hosted users of both RS and PRA to manually implement the updates if their systems do not automatically receive them. Those operating Remote Support versions older than 21.3 or Privileged Remote Access versions older than 22.1 must upgrade to a newer release to apply the necessary patches. The company also highlighted that users of PRA should consider upgrading to version 25.1.1 or newer to fully address the vulnerability.

Harsh Jaiswal, a security researcher and co-founder of Hacktron AI, identified the flaw on January 31, 2026, using AI-driven variant analysis. He reported approximately 11,000 exposed instances on the internet, with around 8,500 being on-premise deployments that remain at risk if patches are not installed.

Importance of Timely Updates

Given BeyondTrust’s history of vulnerabilities being actively exploited, it is crucial for users to update their systems promptly. By doing so, they can ensure robust protection against potential unauthorized access, data breaches, and service disruptions.

As cybersecurity threats continue to evolve, consistently applying security patches remains a vital defense strategy for organizations relying on BeyondTrust’s remote access solutions.

The Hacker News Tags:BeyondTrust, critical update, CVE-2026-1731, Cybersecurity, data security, enterprise security, IT security, network security, Privileged Remote Access, RCE vulnerability, Remote Support, security patch, software update, system protection, vulnerability fix

Post navigation

Previous Post: Detecting Ransomware with Windows Minifilter Technology
Next Post: New Insights on Optimizing KEV Catalog Usage for Security

Related Posts

CISA Warns of Two Malware Strains Exploiting Ivanti EPMM CVE-2025-4427 and CVE-2025-4428 CISA Warns of Two Malware Strains Exploiting Ivanti EPMM CVE-2025-4427 and CVE-2025-4428 The Hacker News
3 Decisions CISOs Need to Make to Prevent Downtime Risk in 2026 3 Decisions CISOs Need to Make to Prevent Downtime Risk in 2026 The Hacker News
Microsoft Reveals Cookie-Based PHP Web Shell Threats Microsoft Reveals Cookie-Based PHP Web Shell Threats The Hacker News
Hackers Target ICTBroadcast Servers via Cookie Exploit to Gain Remote Shell Access Hackers Target ICTBroadcast Servers via Cookie Exploit to Gain Remote Shell Access The Hacker News
Malicious PyPI Package Impersonates SymPy, Deploys XMRig Miner on Linux Hosts Malicious PyPI Package Impersonates SymPy, Deploys XMRig Miner on Linux Hosts The Hacker News
Chaos RaaS Emerges After BlackSuit Takedown, Demanding 0K from U.S. Victims Chaos RaaS Emerges After BlackSuit Takedown, Demanding $300K from U.S. Victims The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark