{"id":43817,"date":"2026-02-21T01:48:24","date_gmt":"2026-02-20T17:48:24","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/21\/cisa-beyondtrust-rce-flaw-now-exploited-in-ransomware-attacks\/"},"modified":"2026-02-21T01:48:24","modified_gmt":"2026-02-20T17:48:24","slug":"cisa-beyondtrust-rce-flaw-now-exploited-in-ransomware-attacks","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/21\/cisa-beyondtrust-rce-flaw-now-exploited-in-ransomware-attacks\/","title":{"rendered":"CISA: BeyondTrust RCE flaw now exploited in ransomware attacks"},"content":{"rendered":"\n<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" height=\"900\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2026\/02\/16\/BeyondTrust.jpg\" width=\"1600\" alt=\"CISA: BeyondTrust RCE flaw now exploited in ransomware attacks\"><\/p>\n<p>Hackers are actively exploiting the CVE-2026-1731 vulnerability in the BeyondTrust Remote Support product, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) warns.<\/p>\n<p>The security issue affects BeyondTrust&#8217;s&nbsp;Remote Support 25.3.1 or earlier and Privileged Remote Access 24.3.4 or earlier, and can be exploited for remote code execution.<\/p>\n<p>CISA added it to the Known Exploited Vulnerabilities (KEV) catalog <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisa-orders-feds-to-patch-beyondtrust-flaw-within-three-days\/\" target=\"_blank\" rel=\"nofollow noopener\">on February 13<\/a>&nbsp;and gave&nbsp;federal agencies just three days to apply the patch or stop using the product.<\/p>\n<div align=\"center\" style=\"width:98%; margin:0 auto; text-align:center; padding:4px; background:#f0f0f0; border:1px solid #ccc; border-radius:6px;\">  <a href=\"https:\/\/www.wiz.io\/lp\/ai-security-board-report-template?utm_source=bleepingcomputer&amp;utm_medium=display&amp;utm_campaign=FY26Q4_INB_FORM_AI-Security-Board-Report-Template&amp;sfcid=701Vh00000Wn7E1IAJ&amp;utm_term=FY27-bleepingcomputer-article-970x250&amp;utm_content=AI-Board-Report\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/w\/ai-security-board-report-template.jpg\" style=\"margin-top: 0px;\" alt=\"CISA: BeyondTrust RCE flaw now exploited in ransomware attacks\"><\/a> <\/div>\n<p>BeyondTrust <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/beyondtrust-warns-of-critical-rce-flaw-in-remote-support-software\/\" target=\"_blank\" rel=\"nofollow noopener\">initially disclosed<\/a>&nbsp;CVE-2026-1731 on February 6. The&nbsp;<a href=\"https:\/\/www.beyondtrust.com\/trust-center\/security-advisories\/bt26-02\" target=\"_blank\" rel=\"nofollow noopener\">security advisory<\/a>&nbsp;classified it as a pre-authentication remote code execution vulnerability caused by an OS command injection weakness, exploitable via specially crafted client requests sent to vulnerable endpoints.<\/p>\n<p>Proof-of-concept (PoC) exploits for CVE-2026-1731 became available shortly after, and <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/critical-beyondtrust-rce-flaw-now-exploited-in-attacks-patch-now\/\" target=\"_blank\" rel=\"nofollow noopener\">in-the-wild exploitation<\/a> started almost immediately.<\/p>\n<p>On February 13, BeyondTrust updated the bulletin&nbsp; to say that exploitation had been detected on January 31, making CVE-2026-1731 a zero-day vulnerability for at least a week.<\/p>\n<p>BeyondTrust states that the report from researcher Harsh Jaiswal and the <a href=\"https:\/\/www.hacktron.ai\/blog\/cve-2026-1731-beyondtrust-remote-support-rce\" target=\"_blank\" rel=\"nofollow noopener\">Hacktron AI team<\/a>&nbsp;confirmed the anomalous activity that they detected on a single Remote Support appliance at the time.<\/p>\n<p>CISA has now activated the &lsquo;Known To Be Used in Ransomware Campaigns?&rsquo; indicator in the KEV catalog.<\/p>\n<p>For customers of the cloud-based application (SaaS), the vendor states the patch was applied automatically on February 2, so no manual intervention is needed.<\/p>\n<p>Customers of the self-hosted instances need to either enable automatic updates and verify that the patch was applied via the &#8216;\/appliance&#8217; interface or manually install it.<\/p>\n<p>For Remote Support, the recommendation is to install version 25.3.2. Privileged Remote Access users should switch to version 25.1.1 or newer.<\/p>\n<p>Those still at RS v21.3 and PRA v22.1 are recommended to upgrade to a newer version before applying the patch.<\/p>\n<style> .ia_ad {     background-color: #f0f6ff;     width: 95%;     max-width: 800px;     margin: 15px auto;     border-radius: 8px;     border: 1px solid #d6ddee;     display: flex;     align-items: stretch;     padding: 0;     overflow: hidden; }  .ia_lef {     flex: 1;     max-width: 200px;     height: auto;     display: flex;     align-items: stretch; }  .ia_lef a {     display: flex;     width: 100%;     height: 100%; }   .ia_lef a img {     width: 100%;     height: 100%;          border-radius: 8px 0 0 8px;     margin: 0;     display: block; }  .ia_rig {     flex: 2;     padding: 10px;     display: flex;     flex-direction: column;     justify-content: center; }  .ia_rig h2 {     font-size: 17px !important;     font-weight: 700;     color: #333;     line-height: 1.4;     font-family: Georgia, \"Times New Roman\", Times, serif;     margin: 0 0 14px 0; }  .ia_rig p {     font-weight: bold;     font-size: 14px;     margin: 0 0 clamp(6px, 2vw, 14px) 0; }  .ia_button {     background-color: #FFF;     border: 1px solid #3b59aa;     color: black;     text-align: center;     text-decoration: none;     border-radius: 8px;     display: inline-block;     font-size: 16px;     font-weight: bold;     cursor: pointer;     padding: 10px 20px;     width: fit-content; }  .ia_button a {     text-decoration: none;     color: inherit;     display: block; }  @media (max-width: 600px) {     .ia_ad {         flex-direction: column;         align-items: center;     }      .ia_lef {         max-width: 100%;     }      .ia_lef a img {         border-radius: 8px 8px 0 0;     }       .ia_rig {         padding: 15px;         width: 100%;     }      .ia_button {         width: 100%; \tmargin: 0px auto;     } } <\/style>\n<div>\n<div>         <a href=\"https:\/\/www.tines.com\/access\/guide\/the-future-of-it-infrastructure\/?utm_source=BleepingComputer&#038;utm_medium=paid_media&#038;utm_content=ROS-inarticlebanner-0102\" target=\"_blank\" rel=\"noopener sponsored\">             <img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/t\/tines-in-art-square.jpg\" alt=\"CISA: BeyondTrust RCE flaw now exploited in ransomware attacks\">         <\/a>     <\/div>\n<div>\n<h2><a href=\"https:\/\/www.tines.com\/access\/guide\/the-future-of-it-infrastructure\/?utm_source=BleepingComputer&#038;utm_medium=paid_media&#038;utm_content=ROS-inarticlebanner-0102\" target=\"_blank\" rel=\"noopener sponsored\">The future of IT infrastructure is here<\/a><\/h2>\n<p>Modern IT infrastructure moves faster than manual workflows can handle.<\/p>\n<p>In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.<\/p>\n<p>          <button><a href=\"https:\/\/www.tines.com\/access\/guide\/the-future-of-it-infrastructure\/?utm_source=BleepingComputer&#038;utm_medium=paid_media&#038;utm_content=ROS-inarticlebanner-0102\" target=\"_blank\" rel=\"noopener sponsored\">Get the guide<\/a><\/button>     <\/div>\n<\/p><\/div>\n<div>\n<h3>Related Articles:<\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisa-orders-feds-to-patch-beyondtrust-flaw-within-three-days\/\">CISA gives feds 3 days to patch actively exploited BeyondTrust flaw<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/critical-beyondtrust-rce-flaw-now-exploited-in-attacks-patch-now\/\">Critical BeyondTrust RCE flaw now exploited in attacks, patch now<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/one-threat-actor-responsible-for-83-percent-of-recent-ivanti-rce-attacks\/\">One threat actor responsible for 83% of recent Ivanti RCE attacks<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisa-flags-microsoft-configmgr-rce-flaw-as-exploited-in-attacks\/\">CISA flags critical Microsoft SCCM flaw as exploited in attacks<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/beyondtrust-warns-of-critical-rce-flaw-in-remote-support-software\/\">BeyondTrust warns of critical RCE flaw in remote support software<\/a><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Hackers are actively exploiting the CVE-2026-1731 vulne [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-43817","post","type-post","status-publish","format-standard","hentry","category--bleepingcomputer"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43817","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=43817"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43817\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=43817"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=43817"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=43817"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}