Critical BeyondTrust Vulnerability Targeted by Hackers Within 24 Hours of PoC Release

Related

Windows 11 Security Update KB5077181 Triggers Boot Failures and System Instability

What happened Microsoft’s February 10, 2026 Patch Tuesday security update...

Google Links Suspected Russian Actor to CANFAIL Malware Targeting Ukrainian Organizations

What happened Google’s Threat Intelligence Group (GTIG) has publicly attributed...

Share

What happened

Threat actors began actively scanning and attempting to exploit a critical vulnerability in BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) products, tracked as CVE-2026-1731, within 24 hours of a publicly released proof-of-concept (PoC) exploit. The flaw allows unauthenticated remote code execution via specially crafted requests and has drawn significant reconnaissance activity from known malicious scanning infrastructure.

Who is affected

Organizations using BeyondTrust Remote Support (versions 25.3.1 and earlier) and Privileged Remote Access (versions 24.3.4 and earlier), with an estimated ~11,000 internet-exposed instances, are potentially exposed if they have not applied the vendor’s patches released early in February 2026.

Why CISOs should care

Remote support and privileged access solutions like those from BeyondTrust sit at the heart of enterprise operations and identity management. A critical remote code execution flaw that can be weaponized rapidly after a PoC release compresses defenders’ patching window and increases the risk of unauthorized access, data theft, service disruption, and broader operational compromise. 

3 practical actions

  1. Verify and apply patches: Ensure all BeyondTrust RS and PRA instances are updated to the latest patched versions; prioritize self-hosted environments that may not auto-update. 
  2. Audit internet-exposed services: Identify and mitigate exposure of remote access tools to the public internet; use network controls and segmentation to limit direct exposure. 
  3. Monitor threat activity: Increase detection and logging around BeyondTrust products for unusual commands or lateral movement attempts, leveraging threat intelligence sources to correlate activity.