Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. BeyondTrust Remote Support and PRA Critical RCE Under
BeyondTrust Remote Support and PRA Critical RCE Under

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-1731

BeyondTrust Remote Support and PRA Critical RCE Under

A critical pre-authentication remote code execution vulnerability in BeyondTrust Remote Support and Privileged Remote Access is under active exploitation,...

Dylan H.

Security Team

February 20, 2026
5 min read

Affected Products

  • BeyondTrust Remote Support <= 25.3.1
  • BeyondTrust Privileged Remote Access <= 24.3.4

Executive Summary

A critical pre-authentication remote code execution (RCE) vulnerability in BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) is under active exploitation by multiple threat actors. The vulnerability, tracked as CVE-2026-1731 (CVSSv4 9.9), allows unauthenticated remote attackers to execute arbitrary OS commands via a trivially simple crafted WebSocket message.

CVSS Score: 9.9 (Critical)

CISA added CVE-2026-1731 to its Known Exploited Vulnerabilities (KEV) catalog on February 13, 2026. Palo Alto's Unit 42 has observed post-exploitation deployment of VShell and SparkRAT backdoors.


Vulnerability Overview

Root Cause

CVE-2026-1731 is a pre-authentication command injection vulnerability triggered through specially crafted client requests. The exploit is described by researchers as "trivially simple" — essentially a WebSocket message with a crafted version string that achieves full remote code execution.

AttributeValue
CVE IDCVE-2026-1731
CVSSv4 Score9.9 (Critical)
TypePre-Auth Remote Code Execution
Attack VectorNetwork (WebSocket)
AuthenticationNone required
Privileges RequiredNone
User InteractionNone
ExploitationActive — multiple threat actors

Affected Versions and Patches

ProductAffected VersionsFixed Version
BeyondTrust Remote Support<= 25.3.125.3.2+
BeyondTrust Privileged Remote Access<= 24.3.424.3.5+

SaaS customers: Patches were automatically deployed on February 2, 2026.

Self-hosted customers: Must apply updates manually. Internet-exposed instances unpatched as of February 9 are at critical risk.


Exploitation Timeline

DateEvent
Jan 31, 2026BeyondTrust detects anomalous activity on a Remote Support appliance
Feb 2, 2026Patches issued and deployed to SaaS customers
Feb 6, 2026Public advisory (BT26-02) released
Feb 9, 2026Self-hosted patch deadline recommended
Feb 10, 2026First public PoC exploits appear; first exploitation attempt observed
Feb 11, 2026GreyNoise detects scanning surge — single IP (Frankfurt VPN) responsible for 86% of probes
Feb 13, 2026CISA adds CVE-2026-1731 to KEV catalog
Feb 14-20, 2026Multiple threat campaigns confirmed deploying post-exploitation malware

Attack Chain

1. Attacker identifies internet-exposed BeyondTrust RS/PRA instance
2. Sends crafted WebSocket message with malicious version string
3. Server processes the message without authentication
4. OS command injection achieves arbitrary code execution
5. Attacker deploys VShell or SparkRAT for persistent access
6. Lateral movement into internal network via the remote access platform

Post-Exploitation Malware

MalwareTypeDescription
VShellBackdoorCross-platform C2 implant with reverse shell, file transfer, and tunneling capabilities
SparkRATRATOpen-source Go-based remote access trojan with modular architecture

Why This Is Especially Dangerous

BeyondTrust's Position in Networks

BeyondTrust Remote Support and PRA are deployed specifically to provide privileged remote access to systems. Compromising these appliances gives attackers:

  • Legitimate remote access infrastructure to pivot into internal networks
  • Credential access — Remote support sessions may contain stored credentials
  • Session hijacking — Active support sessions can be intercepted or replicated
  • Trust exploitation — Traffic from BeyondTrust appliances is typically trusted and may bypass network monitoring

Pre-Auth + Trivial Exploit = Mass Exploitation

The combination of:

  1. No authentication required
  2. Trivially simple exploit (single WebSocket message)
  3. Internet-exposed by design (it's a remote access product)
  4. Public PoCs available

...creates the conditions for mass exploitation, which is exactly what has been observed since February 10.


Immediate Remediation

Patch Now

  1. Self-hosted customers: Apply updates immediately
  2. SaaS customers: Verify automatic patch was applied (check version number)
  3. Verify no compromise: Audit appliance logs from January 31 onward

If Immediate Patching Is Not Possible

  1. Remove BeyondTrust appliances from internet exposure immediately
  2. Place behind VPN or zero-trust access controls
  3. Monitor for WebSocket anomalies — Unusual version strings in connection handshakes
  4. Hunt for VShell and SparkRAT IOCs across the environment
  5. Engage incident response if any indicators of compromise are detected

Detection

Network Indicators

IndicatorDescription
Malformed WebSocket version stringsExploit attempt signature
Outbound connections from BeyondTrust appliance to unknown IPsC2 communication
Unusual process spawning from BeyondTrust servicesPost-exploitation activity
VShell or SparkRAT binary signaturesKnown post-exploitation malware

CISA KEV Deadline

CISA's addition to the KEV catalog on February 13 requires federal agencies to patch by the published deadline. However, with the DHS shutdown furloughing 62% of CISA, enforcement and verification are degraded.


Key Takeaways

  1. CVSSv4 9.9 — Pre-auth RCE via trivial WebSocket exploit
  2. Active exploitation confirmed by multiple threat actors deploying VShell and SparkRAT
  3. Patch immediately — Self-hosted instances unpatched since Feb 9 are at critical risk
  4. BeyondTrust's position in networks makes this especially dangerous for lateral movement
  5. CISA KEV listed — Federal agencies have mandatory patching deadlines

References

  • BeyondTrust Security Advisory BT26-02
  • Rapid7 — CVE-2026-1731: Critical Unauthenticated RCE in BeyondTrust
  • Palo Alto Unit 42 — VShell and SparkRAT in BeyondTrust Exploitation
  • Help Net Security — Hackers Probe, Exploit Newly Patched BeyondTrust RCE Flaw
  • CISA — Known Exploited Vulnerabilities Catalog

Related Reading

  • BeyondTrust Remote Support Pre-Authentication RCE Under
  • BeyondTrust Zero-Day Allows Unauthenticated Command
  • Cisco Unified Communications Zero-Day Exploited for
#BeyondTrust#CVE-2026-1731#RCE#Zero-Day#VShell#SparkRAT#CISA KEV

Related Articles

BeyondTrust Remote Support Pre-Authentication RCE Under

A critical pre-authentication OS command injection vulnerability in BeyondTrust Remote Support and Privileged Remote Access with CVSS 9.9 is being...

3 min read

BeyondTrust Zero-Day Allows Unauthenticated Command

A critical zero-day in BeyondTrust Remote Support and Privileged Remote Access enables unauthenticated command execution, potentially compromising entire...

5 min read

Cisco Unified Communications Zero-Day Exploited for

An actively exploited zero-day in Cisco Unified Communications allows unauthenticated remote code execution with root privileges via crafted HTTP...

3 min read
Back to all Security Alerts