{"id":43695,"date":"2026-02-16T21:10:07","date_gmt":"2026-02-16T13:10:07","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/16\/cisa-gives-feds-3-days-to-patch-actively-exploited-beyondtrust-flaw\/"},"modified":"2026-02-16T21:10:07","modified_gmt":"2026-02-16T13:10:07","slug":"cisa-gives-feds-3-days-to-patch-actively-exploited-beyondtrust-flaw","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/16\/cisa-gives-feds-3-days-to-patch-actively-exploited-beyondtrust-flaw\/","title":{"rendered":"CISA gives feds 3 days to patch actively exploited BeyondTrust flaw"},"content":{"rendered":"\n<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" height=\"900\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2026\/02\/16\/BeyondTrust.jpg\" width=\"1600\" alt=\"CISA gives feds 3 days to patch actively exploited BeyondTrust flaw\"><\/p>\n<p>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) ordered federal&nbsp;agencies on Friday&nbsp;to secure their BeyondTrust Remote Support instances against an actively exploited vulnerability within three days.<\/p>\n<p>BeyondTrust provides identity security services to more than 20,000 customers across over 100 countries, including government agencies and 75% of Fortune 100 companies worldwide.<\/p>\n<p>Tracked as <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/beyondtrust-warns-of-critical-rce-flaw-in-remote-support-software\/\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-1731<\/a>, this remote code execution vulnerability&nbsp;stems&nbsp;from an OS command injection weakness <span style=\"box-sizing:border-box; margin:0px; padding:0px\">and&nbsp;<\/span>affects BeyondTrust&#8217;s&nbsp;Remote Support 25.3.1 or earlier and Privileged Remote Access 24.3.4 or earlier.<\/p>\n<p>While&nbsp;BeyondTrust patched all Remote Support and Privileged Remote Access SaaS instances on February 2, 2026, on-premise customers must install patches manually.<\/p>\n<p>&#8220;Successful exploitation could allow an unauthenticated remote attacker to execute operating system commands in the context of the site user,&#8221; <a href=\"https:\/\/www.beyondtrust.com\/trust-center\/security-advisories\/bt26-02\" rel=\"nofollow noopener\" target=\"_blank\">BeyondTrust said<\/a>&nbsp;when it patched the vulnerability&nbsp;on February 6. &#8220;Successful exploitation requires no authentication or user interaction and may lead to system compromise, including unauthorized access, data exfiltration, and service disruption.&#8221;<\/p>\n<p>Hacktron, who&nbsp;<a href=\"https:\/\/www.hacktron.ai\/blog\/cve-2026-1731-beyondtrust-remote-support-rce\" rel=\"nofollow noopener\" target=\"_blank\">discovered the vulnerability<\/a>&nbsp;and responsibly disclosed it to BeyondTrust on January 31, warned that approximately 11,000 BeyondTrust Remote Support instances were exposed online, around 8,500 of them being&nbsp;on-premises deployments.<\/p>\n<p>On Thursday, six days after&nbsp;BeyondTrust released CVE-2026-1731 security patches, watchTowr head of threat intelligence Ryan Dewhurst reported that attackers are now <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/critical-beyondtrust-rce-flaw-now-exploited-in-attacks-patch-now\/\" target=\"_blank\" rel=\"nofollow noopener\">actively exploiting the security flaw<\/a>,&nbsp;warning admins that unpatched devices should be assumed to be compromised.<\/p>\n<h2>Federal agencies ordered to patch immediately<\/h2>\n<p>One day later, CISA confirmed&nbsp;Dewhurst&#8217;s report,&nbsp;<span style=\"box-sizing:border-box; margin:0px; padding:0px\"><a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2026\/02\/13\/cisa-adds-one-known-exploited-vulnerability-catalog\" target=\"_blank\" rel=\"nofollow noopener\">added<\/a>&nbsp;the vulnerability to its&nbsp;<a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-1731\" target=\"_blank\" rel=\"nofollow noopener\">Known Exploited Vulnerabilities (KEV) catalog,<\/a>&nbsp;and ordered<\/span>&nbsp;Federal Civilian Executive Branch (FCEB) agencies to secure their BeyondTrust instances&nbsp;by the end of Monday, February 16, as mandated by Binding Operational Directive (BOD) 22-01.<\/p>\n<p>&#8220;These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise,&#8221; the U.S. cybersecurity agency warned.&nbsp;&#8220;Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.&#8221;<\/p>\n<p>CISA&#8217;s warning comes on the heels of&nbsp;other&nbsp;BeyondTrust security flaws that were exploited to compromise the systems of U.S. government agencies.<\/p>\n<p>For instance,&nbsp;the U.S. Treasury Department revealed two years ago&nbsp;that <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/us-treasury-department-breached-through-remote-support-platform\/\" rel=\"nofollow noopener\" target=\"_blank\">its network had been hacked<\/a> in an incident&nbsp;<a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2025-01-08\/white-house-rushes-to-finish-cyber-order-after-china-hacks\" rel=\"nofollow noopener\" target=\"_blank\">linked to the Silk Typhoon<\/a>,&nbsp; a notorious&nbsp;Chinese state-backed cyberespionage group.<\/p>\n<p>Silk Typhoon is believed to have exploited two zero-day bugs (CVE-2024-12356 and CVE-2024-12686) to breach&nbsp;<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/beyondtrust-says-hackers-breached-remote-support-saas-instances\/\" rel=\"nofollow noopener\" target=\"_blank\">BeyondTrust&#8217;s systems<\/a>&nbsp;and later used a stolen API key to compromise 17 Remote Support SaaS instances, including&nbsp;the Treasury&#8217;s instance.<\/p>\n<p>The Chinese hacking&nbsp;group&nbsp;has also targeted <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/chinese-hackers-targeted-sanctions-office-in-treasury-attack\/\" rel=\"nofollow noopener\" target=\"_blank\">the Office of Foreign Assets Control (OFAC)<\/a>, which administers U.S. sanctions programs, and&nbsp;<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/treasury-hackers-also-breached-us-foreign-investments-review-office\/\" rel=\"nofollow noopener\" target=\"_blank\">the Committee on Foreign Investment in the United States (CFIUS)<\/a>, which reviews foreign investments for national security risks.<\/p>\n<style> .ia_ad {     background-color: #f0f6ff;     width: 95%;     max-width: 800px;     margin: 15px auto;     border-radius: 8px;     border: 1px solid #d6ddee;     display: flex;     align-items: stretch;     padding: 0;     overflow: hidden; }  .ia_lef {     flex: 1;     max-width: 200px;     height: auto;     display: flex;     align-items: stretch; }  .ia_lef a {     display: flex;     width: 100%;     height: 100%; }   .ia_lef a img {     width: 100%;     height: 100%;          border-radius: 8px 0 0 8px;     margin: 0;     display: block; }  .ia_rig {     flex: 2;     padding: 10px;     display: flex;     flex-direction: column;     justify-content: center; }  .ia_rig h2 {     font-size: 17px !important;     font-weight: 700;     color: #333;     line-height: 1.4;     font-family: Georgia, \"Times New Roman\", Times, serif;     margin: 0 0 14px 0; }  .ia_rig p {     font-weight: bold;     font-size: 14px;     margin: 0 0 clamp(6px, 2vw, 14px) 0; }  .ia_button {     background-color: #FFF;     border: 1px solid #3b59aa;     color: black;     text-align: center;     text-decoration: none;     border-radius: 8px;     display: inline-block;     font-size: 16px;     font-weight: bold;     cursor: pointer;     padding: 10px 20px;     width: fit-content; }  .ia_button a {     text-decoration: none;     color: inherit;     display: block; }  @media (max-width: 600px) {     .ia_ad {         flex-direction: column;         align-items: center;     }      .ia_lef {         max-width: 100%;     }      .ia_lef a img {         border-radius: 8px 8px 0 0;     }       .ia_rig {         padding: 15px;         width: 100%;     }      .ia_button {         width: 100%; \tmargin: 0px auto;     } } <\/style>\n<div>\n<div>         <a href=\"https:\/\/www.tines.com\/access\/guide\/the-future-of-it-infrastructure\/?utm_source=BleepingComputer&#038;utm_medium=paid_media&#038;utm_content=ROS-inarticlebanner-0102\" target=\"_blank\" rel=\"noopener sponsored\">             <img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/t\/tines-in-art-square.jpg\" alt=\"CISA gives feds 3 days to patch actively exploited BeyondTrust flaw\">         <\/a>     <\/div>\n<div>\n<h2><a href=\"https:\/\/www.tines.com\/access\/guide\/the-future-of-it-infrastructure\/?utm_source=BleepingComputer&#038;utm_medium=paid_media&#038;utm_content=ROS-inarticlebanner-0102\" target=\"_blank\" rel=\"noopener sponsored\">The future of IT infrastructure is here<\/a><\/h2>\n<p>Modern IT infrastructure moves faster than manual workflows can handle.<\/p>\n<p>In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.<\/p>\n<p>          <button><a href=\"https:\/\/www.tines.com\/access\/guide\/the-future-of-it-infrastructure\/?utm_source=BleepingComputer&#038;utm_medium=paid_media&#038;utm_content=ROS-inarticlebanner-0102\" target=\"_blank\" rel=\"noopener sponsored\">Get the guide<\/a><\/button>     <\/div>\n<\/p><\/div>\n<div>\n<h3>Related Articles:<\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/critical-beyondtrust-rce-flaw-now-exploited-in-attacks-patch-now\/\">Critical BeyondTrust RCE flaw now exploited in attacks, patch now<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/beyondtrust-warns-of-critical-rce-flaw-in-remote-support-software\/\">BeyondTrust warns of critical RCE flaw in remote support software<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/one-threat-actor-responsible-for-83-percent-of-recent-ivanti-rce-attacks\/\">One threat actor responsible for 83% of recent Ivanti RCE attacks<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisa-flags-microsoft-configmgr-rce-flaw-as-exploited-in-attacks\/\">CISA flags critical Microsoft SCCM flaw as exploited in attacks<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisa-flags-critical-solarwinds-rce-flaw-as-actively-exploited\/\">CISA flags critical SolarWinds RCE flaw as exploited in attacks<\/a><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The U.S. Cybersecurity and Infrastructure Security Agen [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-43695","post","type-post","status-publish","format-standard","hentry","category--bleepingcomputer"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43695","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=43695"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43695\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=43695"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=43695"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=43695"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}