
A critical pre-authentication remote code execution vulnerability in BeyondTrust Remote Support and Privileged Remote Access appliances is now being exploited in attacks after a PoC was published online.
Tracked as CVE-2026-1731 and assigned a near-maximum CVSS score of 9.9, the flaw affects BeyondTrust Remote Support versions 25.3.1 and earlier and Privileged Remote Access versions 24.3.4 and earlier.
BeyondTrust disclosed the vulnerability on February 6, warning that unauthenticated attackers could exploit it by sending specially crafted client requests.
“BeyondTrust Remote Support and older versions of Privileged Remote Access contain a critical pre-authentication remote code execution vulnerability that may be triggered through specially crafted client requests,” explained BeyondTrust.
“Successful exploitation could allow an unauthenticated remote attacker to execute operating system commands in the context of the site user. Successful exploitation requires no authentication or user interaction and may lead to system compromise, including unauthorized access, data exfiltration, and service disruption.”
BeyondTrust automatically patched all Remote Support and Privileged Remote Access SaaS instances on February 2, 2026, but on-premise customers must install patches manually.
CVE-2026-1731 is now exploited in the wild
Hacktron discovered the vulnerability and responsibly disclosed it to BeyondTrust on January 31.
Hacktron says approximately 11,000 BeyondTrust Remote Support instances were exposed online, with around 8,500 on-premises deployments.
Ryan Dewhurst, head of threat intelligence at watchTowr, now reports that attackers have begun actively exploiting the vulnerability, warning that if devices are not patched, they should be assumed to be compromised.
“Overnight we observed first in-the-wild exploitation of BeyondTrust across our global sensors,” Dewhurst posted on X.
“Attackers are abusing get_portal_info to extract the x-ns-company value before establishing a WebSocket channel.”
This exploitation comes a day after a proof-of-concept exploit was published on GitHub targeting the same /get_portal_info endpoint.
The attacks target exposed BeyondTrust portals to retrieve the ‘X-Ns-Company‘ identifier, which is then used to create a websocket to the targeted device. This allows the attackers to execute commands on vulnerable systems.
Organizations using self-hosted BeyondTrust Remote Support or Privileged Remote Access appliances should immediately apply available patches or upgrade to the latest versions.
BleepingComputer contacted BeyondTrust and Dewhurst to ask if they had any details on post-exploitation activity and will update this story if we receive a response.
The future of IT infrastructure is here
Modern IT infrastructure moves faster than manual workflows can handle.
In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.
Related Articles:
BeyondTrust warns of critical RCE flaw in remote support software
CISA says critical VMware RCE flaw now actively exploited
Trend Micro fixes actively exploited remote code execution bug
Critical RCE flaw impacts over 115,000 WatchGuard firewalls
New critical WatchGuard Firebox firewall flaw exploited in attacks
