BeyondTrust RCE (CVE-2026-1731) is being probed and attacked in the wild


A critical unauthenticated remote code execution flaw in BeyondTrust Remote Support and some Privileged Remote Access releases is being actively probed and exploited by attackers. If you run self-hosted instances that are not patched, assume they may be targeted and act now to update or isolate them.

The quick facts

  • Vulnerability: CVE-2026-1731, pre-auth remote code execution.
  • Severity: CVSS 9.9, near maximum.
  • Products affected: BeyondTrust Remote Support (RS) ≤ 25.3.1 and Privileged Remote Access (PRA) ≤ 24.3.4.
  • Patch / SaaS: BeyondTrust has applied the fix to cloud/SaaS instances and published advisories and patches for self-hosted customers. If you are cloud-hosted, updates should already be applied.

Evidence of active exploitation

Researchers and monitoring services reported in-the-wild activity within hours of proof-of-concept material and advisories becoming public. The headline signals:

  • watchTowr’s threat sensors detected the first exploitation attempts and described a pattern where attackers call get_portal_info to capture an x-ns-company value and then open a WebSocket channel. watchTowr.
  • GreyNoise observed reconnaissance and early exploitation scanning, and found that a single IP accounted for 86% of reconnaissance sessions targeting this CVE so far. GreyNoise.
  • Multiple security vendors and news outlets reported rapid weaponization and active exploitation attempts.

Because the flaw allows unauthenticated command execution, even successful reconnaissance can quickly lead to full compromise if an exploit is delivered.

What BeyondTrust says

BeyondTrust’s advisory notes that the patch has been applied to all Remote Support SaaS and Privileged Remote Access SaaS customers as of Feb 2, 2026. Self-hosted customers should apply the published patches or upgrade to fixed versions.

Recommended immediate actions from the vendor include applying vendor patches, isolating exposed instances, and following incident response guidance if suspicious activity is found.

Who is scanning and how fast

GreyNoise data shows a dominant scanner/IP doing most of the early checks. That IP is tied to a commercial VPN provider and has been active as a broad scanner since 2023. The same infrastructure has been used to scan for a wide range of other high-value flaws. This pattern suggests fast automated tooling rather than a single bespoke attacker.

Security teams should assume large-scale automated discovery and treat any internet-facing BeyondTrust instance as high-risk until patched.

Vulnerability breakdown

ItemDetail
CVECVE-2026-1731.
ImpactUnauthenticated RCE remote OS command execution in context of site user.
Affected versionsRS ≤ 25.3.1; PRA ≤ 24.3.4 (self-hosted older releases). SaaS patched Feb 2, 2026.
Exploitation observedReconnaissance and exploitation attempts reported within hours; heavy scanning by a dominant IP.
MitigationApply vendor patches, isolate internet-facing instances, review logs for get_portal_info and WebSocket creation.

Immediate action checklist

Post-incident: if you detect exploitation, follow incident-response playbooks: isolate hosts, preserve evidence, rotate credentials, and engage IR/forensics.
If you run BeyondTrust SaaS/Cloud: confirm with your provider that patches were applied; verify no suspicious logs exist.
If you run self-hosted RS/PRA: apply the vendor patch or upgrade to the fixed versions immediately. If you cannot patch immediately, block public access to the service until patched.
Hunt for indicators: search logs for get_portal_info calls, unexpected WebSocket sessions, rapid POSTs to portal endpoints, and unusual processes spawned by the web service.
Network containment: block or rate-limit suspicious scan IPs, but assume attackers will use diverse infrastructure and VPNs.

What federal and national agencies are doing

The U.S. Cybersecurity and Infrastructure Security Agency added multiple actively exploited flaws to its Known Exploited Vulnerabilities catalog this week. CISA’s KEV actions aim to accelerate patching across the federal civilian estate and the broader community. Organizations should consult the KEV list and prioritize fixes accordingly.

Why this one is especially dangerous

  • Pre-auth RCE gives attackers immediate runway on internet-facing instances.
  • Fast weaponization means the window between disclosure and exploit is very small. Reports show exploitation attempts within 24 hours of PoC material surfacing.
  • Automated scanning concentrates reconnaissance and helps attackers find vulnerable hosts quickly.

Treat any exposed BeyondTrust instance as high priority for remediation.

FAQ

Q: Is my cloud BeyondTrust service already fixed?

A: BeyondTrust says SaaS cloud instances had the patch applied on Feb 2, 2026. Confirm with your provider.

Q: Which versions need patching?

A: Self-hosted Remote Support versions up to 25.3.1 and Privileged Remote Access up to 24.3.4 require patching or upgrade. See BeyondTrust advisories for precise builds.

Q: What logs should I search?

A: Look for get_portal_info endpoints, unexpected x-ns-company values, new WebSocket channels, suspicious POST payloads, and any process creation from the web service context.

Q: Has CISA issued deadlines for this CVE?

A: CISA recently added several actively exploited CVEs to KEV and sets remediation expectations for federal agencies. Check CISA’s KEV catalog for current deadlines and guidance.

Q: How aggressive are the attackers?

A: Data shows rapid automated scanning and reconnaissance. A single IP dominated 86% of early scans, but attackers will pivot quickly. Assume broad scanning and possible exploitation.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages