Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. BeyondTrust Remote Support Pre-Authentication RCE Under
BeyondTrust Remote Support Pre-Authentication RCE Under

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-1731

BeyondTrust Remote Support Pre-Authentication RCE Under

A critical pre-authentication OS command injection vulnerability in BeyondTrust Remote Support and Privileged Remote Access with CVSS 9.9 is being...

Dylan H.

Security Team

February 17, 2026
3 min read

Affected Products

  • BeyondTrust Remote Support <= 25.3.1
  • BeyondTrust Privileged Remote Access <= 24.3.4

Executive Summary

A critical pre-authentication OS command injection vulnerability in BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) is being actively exploited in the wild. Rated CVSS 9.9, attackers can achieve unauthenticated remote code execution via crafted HTTP requests. Exploitation began within 24 hours of Rapid7 publishing a proof-of-concept exploit on February 10.

CISA added CVE-2026-1731 to the Known Exploited Vulnerabilities (KEV) catalog on approximately February 13, 2026.


Vulnerability Details

FieldDetails
CVECVE-2026-1731
CVSS9.9 (Critical)
TypePre-authentication OS Command Injection
VectorCrafted HTTP requests to management interface
AuthenticationNone required
AffectedRemote Support 25.3.1 and earlier, PRA 24.3.4 and earlier

Active Exploitation

Timeline

  • February 2: Cloud-hosted instances auto-patched by BeyondTrust
  • February 10: Rapid7 publishes proof-of-concept exploit
  • Within 24 hours: GreyNoise detects active exploitation attempts
  • February 13: CISA adds to KEV catalog with remediation deadline of February 16

Attack Methodology

Observed post-exploitation activity includes:

  • Deployment of SimpleHelp RMM tools for persistent remote access
  • Lateral movement across internal networks
  • Escalation to Domain Administrator privileges
  • Data exfiltration and ransomware preparation

Exposure

MetricCount
Total exposed instances~11,000
On-premises (potentially vulnerable)~8,500
Cloud-hosted (auto-patched)~2,500

Remediation

Immediate Actions

  1. Patch immediately — update to BeyondTrust RS 25.3.2+ and PRA 24.3.5+
  2. Check for compromise — review logs for unusual HTTP requests to management interface
  3. Hunt for SimpleHelp — search for unauthorized RMM tool installations
  4. Audit admin accounts — check for newly created privileged accounts

If Compromise Is Suspected

  1. Isolate affected systems from the network
  2. Reset all credentials associated with BeyondTrust infrastructure
  3. Review Domain Admin account activity
  4. Engage incident response resources

Detection

Monitor for:

  • Unusual HTTP POST requests to BeyondTrust management endpoints
  • SimpleHelp agent installations on endpoints
  • New administrative accounts created outside normal processes
  • Unexpected PowerShell execution on BeyondTrust servers

With roughly 8,500 potentially vulnerable on-premises instances exposed to the internet and active exploitation confirmed, organizations running self-hosted BeyondTrust must patch immediately.

Related Reading

  • BeyondTrust Remote Support and PRA Critical RCE Under
  • BeyondTrust Zero-Day Allows Unauthenticated Command
  • CVE-2025-68613: n8n Remote Code Execution via Improper
#BeyondTrust#RCE#CVE-2026-1731#Pre-Auth#CISA KEV#Active Exploitation#Critical

Related Articles

BeyondTrust Remote Support and PRA Critical RCE Under

A critical pre-authentication remote code execution vulnerability in BeyondTrust Remote Support and Privileged Remote Access is under active exploitation,...

5 min read

CVE-2025-53521: F5 BIG-IP APM Remote Code Execution — CISA KEV (CVSS 9.8)

A critical unauthenticated RCE vulnerability in F5 BIG-IP APM is being actively exploited in the wild. Malicious traffic targeting access policy virtual servers triggers remote code execution. CISA has added this to the Known Exploited Vulnerabilities catalogue.

4 min read

CVE-2025-68613: n8n Remote Code Execution via Improper

CISA adds CVE-2025-68613 to the Known Exploited Vulnerabilities catalog — a CVSS 9.9 flaw in n8n's workflow expression evaluation system that enables...

5 min read
Back to all Security Alerts