Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Low-Skilled Cybercriminals Use AI to Perform “Vibe Extortion” Attacks

February 17, 2026

China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign

February 17, 2026

Significant Rise in Ransomware Attacks Targeting Industrial Operations

February 17, 2026
Facebook X (Twitter) Instagram
Tuesday, February 17
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»BeyondTrust Fixes Critical Pre-Auth RCE Vulnerability in Remote Support and PRA
News

BeyondTrust Fixes Critical Pre-Auth RCE Vulnerability in Remote Support and PRA

Team-CWDBy Team-CWDFebruary 16, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


BeyondTrust has released updates to address a critical security flaw impacting Remote Support (RS) and Privileged Remote Access (PRA) products that, if successfully exploited, could result in remote code execution.

“BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability,” the company said in an advisory released February 6, 2026.

“By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user.”

The vulnerability, categorized as an operating system command injection, has been assigned the CVE identifier CVE-2026-1731. It’s rated 9.9 on the CVSS scoring system.

BeyondTrust said successful exploitation of the shortcoming could allow an unauthenticated remote attacker to execute operating system commands in the context of the site user, resulting in unauthorized access, data exfiltration, and service disruption.

The issue affects the following versions –

  • Remote Support versions 25.3.1 and prior
  • Privileged Remote Access versions 24.3.4 and prior

It has been patched in the following versions –

  • Remote Support – Patch BT26-02-RS, 25.3.2 and later
  • Privileged Remote Access – Patch BT26-02-PRA, 25.1.1 and later

The company is also urging self-hosted customers of Remote Support and Privileged Remote Access to manually apply the patch if their instance is not subscribed to automatic updates. Those running a Remote Support version older than 21.3 or on Privileged Remote Access older than 22.1 are also required to upgrade to a newer version to apply this patch.

“Self-hosted customers of PRA may also upgrade to 25.1.1 or a newer version to remediate this vulnerability,” it added.

According to security researcher and Hacktron AI co-founder Harsh Jaiswal, the vulnerability was discovered on January 31, 2026, through an artificial intelligence (AI)-enabled variant analysis, adding that it found about 11,000 instances exposed to the internet. Additional details of the flaw have been withheld to give users time to apply the patches.

“About ~8,500 of those are on-prem deployments, which remain potentially vulnerable if patches aren’t applied,” Jaiswal and Mohan Sri Rama Krishna Pedhapati said.

With security flaws in BeyondTrust Privileged Remote Access and Remote Support having come under active exploitation in the past, it’s essential that users update to the latest version as soon as possible for optimal protection.

Update

According to data from attack surface management platform Censys, there are about 190,832 exposed web properties, although it’s currently not clear how many of those are susceptible to the flaw. The majority of the exposures are in the U.S., followed by Germany, Canada, the U.K., France, Switzerland, Australia, and India.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleOpenClaw Integrates VirusTotal Scanning to Detect Malicious ClawHub Skills
Next Article Odido Breach Impacts Millions of Dutch Telco Users
Team-CWD
  • Website

Related Posts

News

Low-Skilled Cybercriminals Use AI to Perform “Vibe Extortion” Attacks

February 17, 2026
News

China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign

February 17, 2026
News

Infostealer Targets OpenClaw to Loot Victim’s Digital Life

February 17, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

What it is and how to protect yourself

January 8, 2026

Why LinkedIn is a hunting ground for threat actors – and how to protect yourself

January 16, 2026

Top IRS scams to look out for in 2026

February 10, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.