CISA Orders Feds Patch BeyondTrust RCE Flaw


CISA added CVE-2026-1731 to its Known Exploited Vulnerabilities catalog on February 13, 2026. Federal agencies must patch affected BeyondTrust systems by end of day February 16. The flaw allows unauthenticated remote code execution in Remote Support and Privileged Remote Access products.

BeyondTrust serves over 20,000 customers including 75% of Fortune 100 companies. The vulnerability affects Remote Support 25.3.1 and earlier, plus Privileged Remote Access 24.3.4 and earlier. Attackers exploit OS command injection without authentication or user interaction.

Hacktron researchers discovered the issue and disclosed it responsibly on January 31, 2026. They identified about 11,000 exposed Remote Support instances online, with 8,500 on-premises. BeyondTrust patched SaaS instances automatically on February 2.

Exploitation Status

WatchTowr’s Ryan Dewhurst reported active attacks on February 12. Unpatched devices should be treated as compromised. CISA issued Binding Operational Directive 22-01 mandating federal fixes within three days.

BeyondTrust warned exploitation leads to system compromise, data theft, and service disruption. The company released patches on February 6 via advisory BT26-02. On-premises users must update manually.

Reconnaissance scanning started within 24 hours of PoC publication on GitHub. GreyNoise detected probes targeting vulnerable instances globally. Attackers focus internet-facing deployments first.

Affected Versions and Patches

ProductVulnerable VersionsFixed Versions
Remote Support (RS)25.3.1 and earlier25.3.2+
Privileged Remote Access (PRA)24.3.4 and earlier24.3.5+rapid7​

CVSS v4 score rates at 9.9 critical. Attack vector requires network access only. No privileges needed for full site user compromise.

Federal Requirements

  • FCEB agencies patch by February 16 close of business.
  • Follow BOD 22-01 for cloud services.
  • Discontinue unpatchable products immediately.
  • Report compliance to CISA.

Historical Context

Chinese group Silk Typhoon exploited prior BeyondTrust zero-days in 2024. Attackers breached US Treasury using CVE-2024-12356 and CVE-2024-12686. They stole API keys and hit 17 SaaS instances including sanctions offices.

Treasury confirmed network breach via Remote Support platform. CFIUS foreign investment reviews also targeted. CISA issued emergency directives then too.

Technical Breakdown

  • Flaw in request handling lacks input validation.
  • Malicious WebSocket requests trigger command injection.
  • Executes as site user context.
  • Leads to unauthorized access and exfiltration.
  • Inventory all BeyondTrust instances immediately.
  • Apply patches to on-premises deployments.
  • Assume exposure on internet-facing systems.
  • Monitor logs for anomalous command execution.
  • Segment remote access tools from critical networks.

BeyondTrust provides full advisory at BT26-02 Security Bulletin.horizon3

FAQ

What is CVE-2026-1731?

Pre-auth RCE via OS command injection in BeyondTrust RS and PRA.

Who must patch by February 16?

Federal Civilian Executive Branch agencies per BOD 22-01.

Are SaaS instances safe?

Yes, BeyondTrust auto-patched them February 2.

How many instances exposed?

11,000 total, 8,500 on-premises per Hacktron.

Past BeyondTrust attacks?

Silk Typhoon hit US Treasury in 2024 via zero-days.

CVSS score?

9.9 critical with no auth required.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages