Critical Zero-Day in BeyondTrust Remote Access Products Allows Remote Code Execution

Critical Zero-Day Vulnerability in BeyondTrust Remote Access Products Exposes Systems to Remote Code Execution

BeyondTrust, a leader in privileged access management solutions, has recently disclosed a critical zero-day vulnerability affecting its Remote Support (RS) and Privileged Remote Access (PRA) platforms. This flaw, identified as CVE-2026-1731 and categorized under CWE-78 (OS Command Injection), allows unauthenticated attackers to execute arbitrary operating system commands on affected systems without requiring user interaction.

Understanding the Vulnerability

The vulnerability enables remote attackers to send specially crafted requests to vulnerable BeyondTrust systems, leading to command execution within the context of the site user. This scenario poses a significant threat, as it does not necessitate prior access credentials or social engineering tactics, making it an attractive target for malicious actors aiming to compromise enterprise remote access infrastructures.

Successful exploitation of this flaw could result in complete system compromise. Attackers may gain unauthorized access to sensitive data, exfiltrate confidential information, disrupt critical services, and potentially move laterally within the network to target other systems. Given that BeyondTrust products are widely utilized for privileged access management and remote support across various enterprise environments, the potential impact of this vulnerability extends beyond individual systems to entire organizational infrastructures.

Affected Versions and Immediate Actions

The vulnerability affects the following versions:

– Remote Support (RS): Versions 25.3.1 and earlier.

– Privileged Remote Access (PRA): Versions 24.3.4 and prior.

Organizations operating these versions are urged to take immediate action to secure their systems.

BeyondTrust’s Response and Mitigation Measures

BeyondTrust has responded promptly to this critical issue. As of February 2, 2026, all Remote Support SaaS and Privileged Remote Access SaaS customers have received automatic patches that fully address the vulnerability.

For self-hosted deployments, manual intervention is required. Organizations using self-hosted versions should apply the following patches through their /appliance interface:

– Remote Support: Patch BT26-02-RS.

– Privileged Remote Access: Patch BT26-02-PRA.

It’s important to note that customers running Remote Support versions older than 21.3 or Privileged Remote Access versions older than 22.1 must first upgrade to a supported version before applying the security patch. Remote Support customers should upgrade to version 25.3.2 or later to ensure complete protection.

Discovery and Responsible Disclosure

The vulnerability was discovered by Harsh Jaiswal and the Hacktron AI team, who utilized AI-enabled variant analysis techniques to identify the flaw. BeyondTrust has commended their responsible disclosure process, which allowed the company to investigate, develop patches, and notify customers before any public exploitation could occur.

Broader Implications and Industry Context

This disclosure underscores the critical importance of timely vulnerability management and the need for organizations to maintain up-to-date systems. The BeyondTrust vulnerability is part of a broader trend of zero-day vulnerabilities being exploited in the wild, highlighting the ever-present risks in the cybersecurity landscape.

For instance, in recent months, other significant vulnerabilities have been identified and exploited:

– Fortra GoAnywhere MFT: A critical command injection flaw (CVE-2025-10035) was actively exploited as a zero-day, allowing unauthenticated remote code execution. Threat actors leveraged this vulnerability to deploy ransomware, emphasizing the severe consequences of such security gaps.

– Ivanti Endpoint Manager Mobile (EPMM): Two zero-day vulnerabilities (CVE-2025-4427 and CVE-2025-4428) were disclosed, which, when chained together, allowed unauthenticated remote code execution. Active exploitation in the wild was confirmed, with nearly 800 vulnerable instances exposed online at the time of disclosure.

– SAP NetWeaver: A previously unknown vulnerability allowed attackers to deploy malicious webshells and gain unauthorized access to enterprise systems, even those running the latest patches. This highlights the persistent risk of zero-day vulnerabilities in critical business platforms.

Recommendations for Organizations

In light of these developments, organizations are advised to:

1. Apply Patches Promptly: Ensure that all systems are updated with the latest security patches to mitigate known vulnerabilities.

2. Monitor for Unusual Activity: Implement robust monitoring to detect signs of compromise or unauthorized access.

3. Limit Exposure: Restrict access to critical systems and services, especially those exposed to the internet, to reduce the attack surface.

4. Conduct Regular Security Assessments: Perform periodic vulnerability assessments and penetration testing to identify and remediate potential security gaps.

5. Educate and Train Staff: Provide ongoing cybersecurity training to employees to recognize and respond to potential threats effectively.

Conclusion

The disclosure of CVE-2026-1731 in BeyondTrust’s Remote Support and Privileged Remote Access platforms serves as a stark reminder of the critical importance of proactive cybersecurity measures. Organizations must remain vigilant, apply security patches promptly, and adopt a comprehensive approach to cybersecurity to protect against evolving threats.