BeyondTrust Flaw Used for Web Shells, Backdoors, and Data Exfiltration
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,抓住主要信息。 文章主要讲的是一个关键的安全漏洞CVE-2026-1731被利用的情况。这个漏洞影响了BeyondTrust的远程支持和特权远程访问产品。攻击者通过这个漏洞执行操作系统命令,进行各种恶意活动,比如部署网络侦察、web shell、C2、后门安装等。 接下来,文章提到Palo Alto Networks Unit 42检测到这个漏洞被积极利用,攻击目标包括美国、法国等多个国家的多个行业,如金融服务、法律服务、高科技等。攻击者利用这个漏洞进行数据窃取和横向移动。 然后,文章解释了漏洞的原因是输入验证不足,导致攻击者可以注入并执行任意shell命令。虽然受影响的账户不是root用户,但控制权足以让攻击者操控设备配置和网络流量。 最后,文章指出CISA已经将此漏洞加入已知被利用的漏洞目录,并提到另一个相关的CVE-2024-12356,可能被中国相关的威胁行为者利用。 总结时需要涵盖关键点:漏洞名称、影响的产品、CVSS评分、攻击者的活动范围、受影响的行业和地区、漏洞的技术细节以及相关背景。同时要保持简洁,不超过100字。 </think> 黑客利用BeyondTrust远程支持和特权远程访问产品的关键漏洞CVE-2026-1731(CVSS评分9.9)进行恶意活动,包括网络侦察、部署后门和窃取数据。该漏洞允许攻击者执行操作系统命令并控制设备配置和网络流量。已影响美国、法国等多国的金融、科技和医疗等行业。 2026-2-20 15:45:0 Author: thehackernews.com(查看原文) 阅读量:1 收藏

Vulnerability / Cyber Attack

Threat actors have been observed exploiting a recently disclosed critical security flaw impacting BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) products to conduct a wide range of malicious actions, including deploying VShell and 

The vulnerability, tracked as CVE-2026-1731 (CVSS score: 9.9), allows attackers to execute operating system commands in the context of the site user.

In a report published Thursday, Palo Alto Networks Unit 42 said it detected the security flaw being actively exploited in the wild for network reconnaissance, web shell deployment, command-and-control (C2), backdoor and remote management tool installs, lateral movement, and data theft.

The campaign has targeted financial services, legal services, high technology, higher education, wholesale and retail, and healthcare sectors across the U.S., France, Germany, Australia, and Canada.

The cybersecurity company described the vulnerability as a case of sanitization failure that enables an attacker to leverage the affected "thin-scc-wrapper" script that's reachable via WebSocket interface to inject and execute arbitrary shell commands in the context of the site user.

"While this account is distinct from the root user, compromising it effectively grants the attacker control over the appliance's configuration, managed sessions and network traffic," security researcher Justin Moore said.

The current scope of attacks exploiting the flaw range from reconnaissance to backdoor deployment -

  • Using a custom Python script to gain access to an administrative account.
  • Installing multiple web shells across directories, including a PHP backdoor that's capable of executing raw PHP code or running arbitrary PHP code without writing new files to disk, as well as a bash dropper that establishes a persistent web shell.
  • Deploying malware such as VShell and Spark RAT.
  • Using out-of-band application security testing (OAST) techniques to validate successful code execution and fingerprint compromised systems.
  • Executing commands to stage, compress and exfiltrate sensitive data, including configuration files, internal system databases and a full PostgreSQL dump, to an external server.

"The relationship between CVE-2026-1731 and CVE-2024-12356 highlights a localized, recurring challenge with input validation within distinct execution pathways," Unit 42 said.

"CVE-2024-12356's insufficient validation was using third-party software (postgres), while CVE-2026-1731's insufficient validation problem occurred in the BeyondTrust Remote Support (RS) and older versions of the BeyondTrust Privileged Remote Access (PRA) codebase."

With CVE-2024-12356 exploited by China-nexus threat actors like Silk Typhoon, the cybersecurity company noted that CVE-2026-1731 could also be a target for sophisticated threat actors.

The development comes as the U.S. Cybersecurity and Infrastructure Security Agency (CISA) updated its Known Exploited Vulnerabilities (KEV) catalog entry for CVE-2026-1731 to confirm that the bug has been exploited in ransomware campaigns.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/02/beyondtrust-flaw-used-for-web-shells.html
如有侵权请联系:admin#unsafe.sh