Latest BeyondTrust vulnerability: CVE-2026-1731 #

BeyondTrust disclosed a pre-authentication remote code execution (RCE) vulnerability affecting certain versions of both Remote Support (RS) and Privileged Remote Access (PRA). This flaw is triggered via specially crafted client requests sent to the appliance. Successful exploitation could allow a remote, unauthenticated adversary to execute arbitrary operating system commands in the context of the site user, potentially leading to full system compromise. The vulnerability has been designated CVE-2026-1731 and has been rated critical with a CVSS score of 9.9.

There is evidence that this vulnerability is being actively exploited in the wild.

    The following versions are affected

    • Remote Support (RS) versions 25.3.1 and prior
    • Privileged Remote Access (PRA) versions 24.3.4 and prior

      What are BeyondTrust Remote Support, and Privileged Remote Access?
      #

      BeyondTrust Remote Support (RS) is an enterprise platform designed for help desks to securely access and troubleshoot end-user devices or mobile platforms across any network without a VPN.

      BeyondTrust Privileged Remote Access (PRA) is a zero-trust security solution providing vendors and internal admins with granular, audited access to critical infrastructure without granting full network visibility.

      What is the impact? #

      Successful exploitation of the vulnerability would allow an adversary to execute arbitrary code on the vulnerable host, potentially leading to complete system compromise.

      Are updates or workarounds available? #

      Users are encouraged to update to the latest version as quickly as possible:

      • Remote Support (RS) versions 21.3 and older upgrade to a newer version to apply patch BT26-02-RS
      • Remote Support (RS) versions 25.3.1 and prior upgrade to version 25.3.2 and later
      • Privileged Remote Access (PRA) versions 22.1 and older upgrade to a newer version to apply patch BT26-02-PRA
      • Privileged Remote Access (PRA) versions 24.3.4 and prior upgrade to version 25.1.1 and later

      How to find potentially vulnerable systems with runZero #

      From the Services Inventory, use the following query to locate potentially impacted assets:

      _asset.protocol:=http AND protocol:=http AND
        (product:="BeyondTrust Remote Support" OR
        product:="Beyond Trust Remote Support" OR
        product:="BeyondTrust BeyondTrust Remote Support" OR
        product:="BeyondTrust Privileged Remote Access")
        AND _service.product:beyondtrust

      January 2025: CVE-2024-12356 #

      BeyondTrust disclosed that affects their Privileged Remote Access (PRA) and Remote Support (RS) appliances. This has also been added to the CISA KEV as it has been exploited in the wild.

      • CVE-2024-12356 is rated highly-critical with a CVSS score of 9.8. Successful exploitation of this vulnerability would allow an attacker execute arbitrary commands on the appliance.

      What is the impact? #

      The issue impacts PRA and RS versions 24.3.1 and earlier.

      Are updates or workarounds available? #

      BeyondTrust has released a patch for all supported iterations of PRA and RS versions 22.1.x and higher and has applied the patch to cloud customers earlier this week.

      How do I find potentially vulnerable systems with runZero? #

      From the Services Inventory, use the following query to locate systems running potentially vulnerable software:

      vendor:BeyondTrust or http.body:BeyondTrust
      

      From the Assets Inventory, use the following query to locate systems running potentially vulnerable software:

      os:BeyondTrust OR hw:BeyondTrust OR os:Bomgar OR hw:Bomgar

      Written by Matthew Kienow

      Matthew Kienow is a software engineer and security researcher. Matthew previously worked on the Recog recognition framework, AttackerKB as well as Metasploit's MSF 5 APIs. He has also designed, built, and successfully deployed many secure software solutions; however, often he enjoys breaking them instead. He has presented his research at various security conferences including DerbyCon, Hack In Paris, and CarolinaCon. His research has been cited by CSO, Threatpost and SC Magazine.

      More about Matthew Kienow

      Written by Blain Smith

      Blain Smith is a Security Research Engineer at runZero. He spent most of his career in cloud and distributed systems for AAA gaming, entertainment, and networking working on some of the most popular games and systems millions of people play and watch daily. He has given numerous talks at conferences such as TEDx, GopherCon, and P99CONF. His shift into infosec has afforded him the ability to apply his distributed systems and networking knowledge to other industries such as IoT and OT.

      More about Blain Smith
      Subscribe Now

      Get the latest news and expert insights delivered in your inbox.

      Welcome to the club! Your subscription to our newsletter is successful.

      See Results in Minutes

      See & secure your total attack surface. Even the unknowns & unmanageable.