CISA: BeyondTrust RCE flaw now exploited in ransomware attacks
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内。用户给的文章是关于BeyondTrust Remote Support产品的漏洞CVE-2026-1731被黑客利用的情况。 首先,我需要通读整篇文章,抓住关键点。文章提到CISA警告黑客正在利用这个漏洞,影响了Remote Support 25.3.1及更早版本和Privileged Remote Access 24.3.4及更早版本。漏洞允许远程代码执行,CISA在2月13日将其加入已知被利用的漏洞目录,并给了联邦机构三天时间打补丁或停用产品。 此外,BeyondTrust在2月6日披露了这个漏洞,属于预身份验证的远程代码执行问题,由操作系统命令注入弱点引起。PoC很快出现,野外利用也迅速开始。到了2月13日,BeyondTrust更新公告说他们在1月31日就检测到被利用的情况,所以这个漏洞至少一周是零日漏洞。 CISA现在激活了该漏洞用于勒索软件活动的指标。对于云客户,补丁在2月2日自动应用;自托管客户需要手动或自动更新到指定版本。 总结的时候要包括主要信息:漏洞名称、影响的产品版本、远程代码执行风险、CISA的行动、补丁情况以及时间线。控制在100字以内。 现在组织语言:BeyondTrust Remote Support和Privileged Remote Access存在严重漏洞CVE-2026-1731,可导致远程代码执行。CISA已将其列为已知被利用的漏洞,并要求联邦机构在三日内完成修复或停用。该漏洞已被用于实际攻击,并且属于零日漏洞。 </think> BeyondTrust Remote Support和Privileged Remote Access存在严重漏洞CVE-2026-1731,可导致远程代码执行。CISA已将其列为已知被利用的漏洞,并要求联邦机构在三日内完成修复或停用。该漏洞已被用于实际攻击,并且属于零日漏洞。 2026-2-20 17:15:21 Author: www.bleepingcomputer.com(查看原文) 阅读量:3 收藏

CISA: BeyondTrust RCE flaw now exploited in ransomware attacks

Hackers are actively exploiting the CVE-2026-1731 vulnerability in the BeyondTrust Remote Support product, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) warns.

The security issue affects BeyondTrust's Remote Support 25.3.1 or earlier and Privileged Remote Access 24.3.4 or earlier, and can be exploited for remote code execution.

CISA added it to the Known Exploited Vulnerabilities (KEV) catalog on February 13 and gave federal agencies just three days to apply the patch or stop using the product.

Wiz

BeyondTrust initially disclosed CVE-2026-1731 on February 6. The security advisory classified it as a pre-authentication remote code execution vulnerability caused by an OS command injection weakness, exploitable via specially crafted client requests sent to vulnerable endpoints.

Proof-of-concept (PoC) exploits for CVE-2026-1731 became available shortly after, and in-the-wild exploitation started almost immediately.

On February 13, BeyondTrust updated the bulletin  to say that exploitation had been detected on January 31, making CVE-2026-1731 a zero-day vulnerability for at least a week.

BeyondTrust states that the report from researcher Harsh Jaiswal and the Hacktron AI team confirmed the anomalous activity that they detected on a single Remote Support appliance at the time.

CISA has now activated the ‘Known To Be Used in Ransomware Campaigns?’ indicator in the KEV catalog.

For customers of the cloud-based application (SaaS), the vendor states the patch was applied automatically on February 2, so no manual intervention is needed.

Customers of the self-hosted instances need to either enable automatic updates and verify that the patch was applied via the '/appliance' interface or manually install it.

For Remote Support, the recommendation is to install version 25.3.2. Privileged Remote Access users should switch to version 25.1.1 or newer.

Those still at RS v21.3 and PRA v22.1 are recommended to upgrade to a newer version before applying the patch.

tines

The future of IT infrastructure is here

Modern IT infrastructure moves faster than manual workflows can handle.

In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.


文章来源: https://www.bleepingcomputer.com/news/security/cisa-beyondtrust-rce-flaw-now-exploited-in-ransomware-attacks/
如有侵权请联系:admin#unsafe.sh