CISA gives feds 3 days to patch actively exploited BeyondTrust flaw
好的,我现在需要帮用户总结一篇文章,控制在100字以内。首先,我得仔细阅读文章内容,理解主要信息。 文章讲的是美国网络安全和基础设施安全局(CISA)要求联邦机构在三天内修复BeyondTrust Remote Support中的一个漏洞。这个漏洞被追踪为CVE-2026-1731,属于远程代码执行漏洞,源于操作系统命令注入弱点。 BeyondTrust为全球超过2万家客户提供身份安全服务,包括政府机构和大部分财富100强公司。漏洞影响的是Remote Support 25.3.1及更早版本,以及Privileged Remote Access 24.3.4及更早版本。虽然SaaS实例已经在2月2日修补,但本地部署的客户需要手动安装补丁。 研究人员Hacktron发现约1.1万个实例暴露在线上,其中8500个是本地部署。攻击者已经开始积极利用这个漏洞。CISA将该漏洞加入已知被利用的漏洞目录,并下令联邦机构在2月16日前修复。 此外,文章提到过去BeyondTrust的安全漏洞曾被利用攻击美国政府系统,比如财政部曾被Silk Typhoon黑客组织入侵,利用零日漏洞和被盗API密钥入侵了多个实例。 现在我要把这些信息浓缩到100字以内。重点包括:CISA要求联邦机构修复BeyondTrust漏洞;漏洞编号CVE-2026-1731;影响范围;SaaS和本地部署的处理方式;攻击者正在利用;以及历史上的类似攻击事件。 要注意用词简洁,避免重复信息。确保涵盖主要点:机构、指令、漏洞细节、影响、修复情况、攻击现状以及历史背景。 </think> 美国网络安全机构CISA要求联邦机构在三天内修复BeyondTrust Remote Support中的远程代码执行漏洞(CVE-2026-1731),该漏洞可被无认证攻击者利用以控制受影响系统。研究人员发现约1.1万个实例暴露在线上,其中8500个为本地部署。CISA警告称此漏洞已被积极利用,并将其加入已知被利用的漏洞目录。 2026-2-16 12:45:17 Author: www.bleepingcomputer.com(查看原文) 阅读量:0 收藏

BeyondTrust

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) ordered federal agencies on Friday to secure their BeyondTrust Remote Support instances against an actively exploited vulnerability within three days.

BeyondTrust provides identity security services to more than 20,000 customers across over 100 countries, including government agencies and 75% of Fortune 100 companies worldwide.

Tracked as CVE-2026-1731, this remote code execution vulnerability stems from an OS command injection weakness and affects BeyondTrust's Remote Support 25.3.1 or earlier and Privileged Remote Access 24.3.4 or earlier.

Wiz

While BeyondTrust patched all Remote Support and Privileged Remote Access SaaS instances on February 2, 2026, on-premise customers must install patches manually.

"Successful exploitation could allow an unauthenticated remote attacker to execute operating system commands in the context of the site user," BeyondTrust said when it patched the vulnerability on February 6. "Successful exploitation requires no authentication or user interaction and may lead to system compromise, including unauthorized access, data exfiltration, and service disruption."

Hacktron, who discovered the vulnerability and responsibly disclosed it to BeyondTrust on January 31, warned that approximately 11,000 BeyondTrust Remote Support instances were exposed online, around 8,500 of them being on-premises deployments.

On Thursday, six days after BeyondTrust released CVE-2026-1731 security patches, watchTowr head of threat intelligence Ryan Dewhurst reported that attackers are now actively exploiting the security flaw, warning admins that unpatched devices should be assumed to be compromised.

Federal agencies ordered to patch immediately

One day later, CISA confirmed Dewhurst's report, added the vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, and ordered Federal Civilian Executive Branch (FCEB) agencies to secure their BeyondTrust instances by the end of Monday, February 16, as mandated by Binding Operational Directive (BOD) 22-01.

"These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise," the U.S. cybersecurity agency warned. "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable."

CISA's warning comes on the heels of other BeyondTrust security flaws that were exploited to compromise the systems of U.S. government agencies.

For instance, the U.S. Treasury Department revealed two years ago that its network had been hacked in an incident linked to the Silk Typhoon,  a notorious Chinese state-backed cyberespionage group.

Silk Typhoon is believed to have exploited two zero-day bugs (CVE-2024-12356 and CVE-2024-12686) to breach BeyondTrust's systems and later used a stolen API key to compromise 17 Remote Support SaaS instances, including the Treasury's instance.

The Chinese hacking group has also targeted the Office of Foreign Assets Control (OFAC), which administers U.S. sanctions programs, and the Committee on Foreign Investment in the United States (CFIUS), which reviews foreign investments for national security risks.

tines

The future of IT infrastructure is here

Modern IT infrastructure moves faster than manual workflows can handle.

In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.


文章来源: https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-beyondtrust-flaw-within-three-days/
如有侵权请联系:admin#unsafe.sh