CVE-2026-1731 fuels ongoing attacks on BeyondTrust remote access products
好的,我现在需要帮用户总结一篇文章,控制在100字以内。用户给的原文是关于CVE-2026-1731漏洞的,看起来挺复杂的。 首先,我得通读全文,抓住关键点。文章提到这个漏洞被用来攻击BeyondTrust的远程支持和特权远程访问产品。攻击者利用这个漏洞部署VShell,获得持久访问、横向移动和控制权。 然后,漏洞的CVSS评分是9.9,属于严重级别。攻击者可以执行操作系统命令,甚至完全控制系统。BeyondTrust已经发布了补丁,但仍有大量暴露在网上的实例。 接下来,Hacktron团队报告了大约11,000个暴露的实例,其中大部分是内部系统。攻击者利用PoC脚本短暂劫持管理员账户,并部署多种恶意工具。 最后,CISA警告这个漏洞被用于勒索软件活动。 现在我要把这些信息浓缩到100字以内。需要包括:漏洞名称、影响的产品、攻击者的行动、漏洞的严重性、补丁情况、暴露实例数量以及被用于勒索软件的事实。 可能的结构:描述漏洞被利用的情况,攻击者的行动,漏洞的影响和严重性,补丁发布情况,暴露实例数量及行业分布,以及CISA的警告。 现在组织语言: “攻击者利用CVE-2026-1731漏洞针对BeyondTrust RS和PRA产品进行攻击。通过该漏洞部署VShell等工具以获得持久访问、横向移动并控制受损系统。该漏洞CVSS评分为9.9,允许未认证攻击者执行远程代码。BeyondTrust已发布补丁修复此问题。约有11,000个实例暴露于网络中。” 这样大约85字左右。 </think> 攻击者利用CVE-2026-1731漏洞针对BeyondTrust RS和PRA产品进行攻击。通过该漏洞部署VShell等工具以获得持久访问、横向移动并控制受损系统。该漏洞CVSS评分为9.9,允许未认证攻击者执行远程代码。BeyondTrust已发布补丁修复此问题。约有11,000个实例暴露于网络中。 2026-2-23 12:9:32 Author: securityaffairs.com(查看原文) 阅读量:19 收藏

CVE-2026-1731 fuels ongoing attacks on BeyondTrust remote access products

Pierluigi Paganini February 23, 2026

Attackers are exploiting CVE-2026-1731 in BeyondTrust RS and PRA to deploy VShell, gain persistence, move laterally, and control compromised systems.

Threat actors are actively exploiting a recently disclosed critical vulnerability, tracked as CVE-2026-1731 (CVSS score: 9.9), in BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA).

The flaw is being used to conduct a wide range of malicious activities, including deploying VShell and other tools to gain persistence, move laterally, and maintain remote control over compromised systems.

Recenlty, BeyondTrust released security updates to address the critical flaw in its Remote Support and older Privileged Remote Access products. The bug could allow an unauthenticated attacker to send specially crafted requests and run operating system commands remotely, without logging in. The issue, disclosed on February 6, 2026, could lead to full remote code execution if exploited, making the updates essential to prevent abuse.

“BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability.” reads the advisory. “By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user.”

Exploiting the flaw would let a remote attacker run system commands without authentication or user interaction, potentially leading to full system compromise, data theft, and service disruption.

BeyondTrust released patches for CVE-2026-1731 on February 6 after Hacktron researchers warned that about thousands of instances were exposed online.

Hacktron AI team reported that roughly 11,000 BeyondTrust Remote Support instances are exposed online across cloud and on-prem environments. Around 8,500 of these are on-prem systems and could remain vulnerable if not patched. The affected deployments are mainly used by large organizations, including enterprises in healthcare, financial services, government, and hospitality sectors.

After a PoC exploit went public on February 10, GreyNoise detected attack attempts within 24 hours, with one IP responsible for most reconnaissance activity.

In a new report, Palo Alto Networks Unit 42 confirmed the flaw is being actively exploited for reconnaissance, web shell deployment, C2 activity, backdoor installation, lateral movement, and data theft. The campaign has hit multiple sectors, including finance, legal, tech, education, retail, and healthcare, across the U.S., France, Germany, Australia, and Canada.

Threat actors used a custom Python script to briefly hijack the main admin account (User ID 1) for 60 seconds.

“The Python script functions by querying the target’s database to back up the existing password hash for the primary administrator (User ID 1). It leverages the application’s own authentication binary (check_auth) to generate a valid hash for the password string password and injects the hash into the database.” reads the report published by Palo Alto Networks.

The script backed up the original password hash, generated a valid one for a known password, injected it into the database, then restored the original hash and deleted itself—minimizing traces and evading detection.

Unit 42 observed attackers deploying multiple web shells, including one-line, password-protected PHP backdoors that execute Base64-encoded commands via eval() without writing extra files. The researchers spotted the usage of a more advanced shell (aws.php) that acted as a stealth C2 gate, echoing markers linked to tools like China Chopper. A bash dropper used “config STOMPing” to persist by loading a malicious Apache configuration into memory while keeping disk files clean.

The campaign also leveraged SparkRAT, VShell, PowerShell downloaders, a multi-method Linux “download-and-execute” cradle, and attempted Meterpreter reverse shells over port 4444.

Recently, the Cybersecurity and Infrastructure Security Agency warned that CVE-2026-1731 has been actively exploited in ransomware campaigns, prompting a revision of its KEV catalog entry.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, CVE-2026-1731)




文章来源: https://securityaffairs.com/188370/hacking/cve-2026-1731-fuels-ongoing-attacks-on-beyondtrust-remote-access-products.html
如有侵权请联系:admin#unsafe.sh