BeyondTrust Fixes Critical Pre-Auth RCE Vulnerability in Remote Support and PRA
嗯,用户让我帮忙总结一篇文章,控制在一百个字以内,而且不需要特定的开头。首先,我得仔细阅读这篇文章,理解主要内容。 文章讲的是BeyondTrust公司发布了更新,修复了一个关键的安全漏洞。这个漏洞影响了他们的Remote Support和Privileged Remote Access产品。如果被成功利用,可能导致远程代码执行。漏洞被归类为操作系统命令注入,CVE编号是CVE-2026-1731,CVSS评分9.9分。 受影响的版本是Remote Support 25.3.1及之前版本,以及Privileged Remote Access 24.3.4及之前版本。已经修复的版本是Remote Support 25.3.2及以上,以及Privileged Remote Access 25.1.1及以上。公司建议自托管客户手动应用补丁,并升级旧版本。 另外,安全研究员Harsh Jaiswal通过AI发现了这个漏洞,大约有11,000个暴露在互联网上的实例,其中8,500个是内部部署的。他们没有公开更多细节,给用户时间打补丁。 总结的时候需要涵盖主要信息:漏洞名称、影响的产品、严重性、CVE编号、CVSS评分、受影响和修复的版本、建议措施以及漏洞发现的情况。控制在一百字以内,所以要简洁明了。 可能的结构:BeyondTrust修复了影响RS和PRA产品的关键远程代码执行漏洞(CVE-2026-1731),CVSS评分9.9。旧版本受影响,已发布补丁。建议升级以应对潜在风险。 </think> BeyondTrust修复了影响Remote Support和Privileged Remote Access产品的关键远程代码执行漏洞(CVE-2026-1731),CVSS评分为9.9。旧版本存在风险,已发布补丁建议升级以应对潜在风险。 2026-2-9 08:3:0 Author: thehackernews.com(查看原文) 阅读量:0 收藏

Enterprise Security / Network Security

BeyondTrust has released updates to address a critical security flaw impacting Remote Support (RS) and Privileged Remote Access (PRA) products that, if successfully exploited, could result in remote code execution.

"BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability," the company said in an advisory released February 6, 2026.

"By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user."

The vulnerability, categorized as an operating system command injection, has been assigned the CVE identifier CVE-2026-1731. It's rated 9.9 on the CVSS scoring system.

BeyondTrust said successful exploitation of the shortcoming could allow an unauthenticated remote attacker to execute operating system commands in the context of the site user, resulting in unauthorized access, data exfiltration, and service disruption.

The issue affects the following versions -

  • Remote Support versions 25.3.1 and prior
  • Privileged Remote Access versions 24.3.4 and prior

It has been patched in the following versions -

  • Remote Support - Patch BT26-02-RS, 25.3.2 and later
  • Privileged Remote Access - Patch BT26-02-PRA, 25.1.1 and later

The company is also urging self-hosted customers of Remote Support and Privileged Remote Access to manually apply the patch if their instance is not subscribed to automatic updates. Those running a Remote Support version older than 21.3 or on Privileged Remote Access older than 22.1 are also required to upgrade to a newer version to apply this patch.

"Self-hosted customers of PRA may also upgrade to 25.1.1 or a newer version to remediate this vulnerability," it added.

According to security researcher and Hacktron AI co-founder Harsh Jaiswal, the vulnerability was discovered on January 31, 2026, through an artificial intelligence (AI)-enabled variant analysis, adding that it found about 11,000 instances exposed to the internet. Additional details of the flaw have been withheld to give users time to apply the patches.

"About ~8,500 of those are on-prem deployments, which remain potentially vulnerable if patches aren't applied," Jaiswal said.

With security flaws in BeyondTrust Privileged Remote Access and Remote Support having come under active exploitation in the past, it's essential that users update to the latest version as soon as possible for optimal protection.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/02/beyondtrust-fixes-critical-pre-auth-rce.html
如有侵权请联系:admin#unsafe.sh