Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release
嗯,用户让我帮忙总结一下这篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头,直接写描述。首先,我需要通读整篇文章,抓住关键点。 文章主要讲的是BeyondTrust的一个漏洞CVE-2026-1731被迅速利用的情况。漏洞评分很高,9.9分,属于严重级别。攻击者在PoC发布后不到24小时内就开始了攻击。漏洞允许未认证的远程代码执行,影响了远程支持和旧版特权远程访问产品。 然后,文章提到修复补丁是在2月6日发布的,但Hacktron团队发现有11,000个实例暴露在线上。GreyNoise检测到攻击尝试在PoC发布后一天内就开始了,大部分扫描来自一个IP地址。 用户的需求是总结内容,所以我要提取关键信息:漏洞名称、评分、攻击时间、影响范围、修复情况、暴露实例数量以及攻击行为的快速响应。 现在要把这些信息浓缩到100字以内,确保涵盖所有重要点:漏洞名称、CVSS评分、攻击时间、漏洞影响(未认证远程代码执行)、修复时间、暴露实例数量以及GreyNoise检测到的攻击行为。 最后检查一下字数是否符合要求,并确保表达清晰简洁。 </think> BeyondTrust CVE-2026-1731(CVSS 9.9)是一种严重预身份验证远程代码执行漏洞。攻击者在PoC发布后24小时内迅速利用该漏洞对未修补的系统发起攻击。该漏洞允许未认证攻击者远程执行操作系统命令,可能导致系统完全被控制或数据泄露。修复补丁已于2月6日发布,但仍有大量实例暴露在线上。 2026-2-13 15:19:9 Author: securityaffairs.com(查看原文) 阅读量:0 收藏

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Pierluigi Paganini February 13, 2026

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code execution.

Threat actors rapidly began exploiting a newly patched BeyondTrust vulnerability, tracked as CVE-2026-1731 (CVSS score of 9.9), soon after a proof-of-concept exploit became public.

This week BeyondTrust released security updates to address the critical flaw in its Remote Support and older Privileged Remote Access products. The bug could allow an unauthenticated attacker to send specially crafted requests and run operating system commands remotely, without logging in. The issue, disclosed on February 6, 2026, could lead to full remote code execution if exploited, making the updates essential to prevent abuse.

“BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability.” reads the advisory. “By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user.”

Exploiting the flaw would let a remote attacker run system commands without authentication or user interaction, potentially leading to full system compromise, data theft, and service disruption.

”Successful exploitation could allow an unauthenticated remote attacker to execute operating system commands in the context of the site user.” continues the advisory. “Successful exploitation requires no authentication or user interaction and may lead to system compromise, including unauthorized access, data exfiltration, and service disruption.”

BeyondTrust released patches for CVE-2026-1731 on February 6 after Hacktron researchers warned that about thousands of instances were exposed online.

Hacktron AI team reported that roughly 11,000 BeyondTrust Remote Support instances are exposed online across cloud and on-prem environments. Around 8,500 of these are on-prem systems and could remain vulnerable if not patched. The affected deployments are mainly used by large organizations, including enterprises in healthcare, financial services, government, and hospitality sectors.

After a PoC exploit went public on February 10, GreyNoise detected attack attempts within 24 hours, with one IP responsible for most reconnaissance activity.

“On February 10, a proof-of-concept exploit for CVE-2026-1731, a critical pre-authentication remote code execution vulnerability in BeyondTrust Remote Support and Privileged Remote Access, was posted to GitHub. By February 11, GreyNoise’s Global Observation Grid was recording reconnaissance probing for vulnerable BeyondTrust instances.” reported GreyNoise.

GreyNoise observed rapid reconnaissance for CVE-2026-1731, led by a single IP responsible for 86% of scans. The activity comes from a long-running scanning operation using a commercial VPN and Linux-based tooling. Threat actors mainly probe non-standard ports, suggesting they know enterprises move BeyondTrust services off 443. JA4+ fingerprints show shared exploit tools and VPN tunneling.

The same IPs also target SonicWall, MOVEit, Log4j, Sophos, SSH, and IoT devices, showing multi-exploit behavior. BeyondTrust tools are high-value targets, and past zero-day chains remain active even as new variants quickly emerge.

“The IPs performing reconnaissance for CVE-2026-1731 aren’t single-purpose. While their BeyondTrust activity is a check (enumeration), their GreyNoise profiles show they’re simultaneously conducting active exploitation attempts against other products: SonicWall, MOVEit Transfer, Log4j, Sophos firewalls, SSH brute-forcing, and IoT default-credential testing.” concludes the report. “Some IPs are even using out-of-band callback domains (OAST), a more sophisticated technique to confirm vulnerability before delivering payloads.”

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, CVE-2026-1731)




文章来源: https://securityaffairs.com/187962/uncategorized/attackers-exploit-beyondtrust-cve-2026-1731-within-hours-of-poc-release.html
如有侵权请联系:admin#unsafe.sh