Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

European offshore wind power for a competitive EU steel industry

TeamPCP worm exploits cloud infrastructure to build criminal infrastructure

BeyondTrust fixes critical pre-authentication RCE vulnerability in remote support and PRA

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » BeyondTrust fixes critical pre-authentication RCE vulnerability in remote support and PRA
Identity

BeyondTrust fixes critical pre-authentication RCE vulnerability in remote support and PRA

userBy userFebruary 9, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananFebruary 9, 2026Enterprise Security/Network Security

BeyondTrust has released an update that addresses a critical security flaw affecting its Remote Support (RS) and Privileged Remote Access (PRA) products. Successful exploitation could lead to remote code execution.

“Certain older versions of BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability,” the company said in an advisory published on February 6, 2026.

“By sending a specially crafted request, an unauthenticated, remote attacker may be able to execute operating system commands in the context of a site user.”

This vulnerability is classified as an Operating System Command Injection and has been assigned the CVE identifier CVE-2026-1731. It is rated 9.9 on the CVSS scoring system.

BeyondTrust said that successful exploitation of this flaw could allow an unauthenticated, remote attacker to execute operating system commands in the context of a site user, potentially resulting in unauthorized access, data disclosure, or service interruption.

This issue affects the following versions:

Remote Support version 25.3.1 and earlier Privileged Remote Access version 24.3.4 and earlier

The following versions have been patched:

Remote Support – Patch BT26-02-RS, 25.3.2 or later Privileged Remote Access – Patch BT26-02-PRA, 25.1.1 or later

The company is also reminding its Remote Support and Privileged Remote Access self-host customers to manually apply the patch if their instances are not registered for automatic updates. If you are running a version of Remote Support older than 21.3 or Privileged Remote Access older than 22.1, you must also upgrade to the new version to apply this patch.

“PRA self-hosted customers may also upgrade to version 25.1.1 or later to fix this vulnerability,” it added.

Harsh Jaiswal, security researcher and co-founder of Hacktron AI, said the vulnerability was discovered on January 31, 2026 through artificial intelligence (AI)-enabled variant analysis, adding that approximately 11,000 instances were found exposed to the internet. Additional details of the flaw are being withheld to give users time to apply the patch.

“About 8,500 of these are on-premises deployments, which remain potentially vulnerable if not patched,” Jaiswal said.

Security flaws in BeyondTrust Privileged Remote Access and Remote Support have been exploited in the past and it is important for users to update to the latest version as soon as possible for optimal protection.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleWorking together to build the fusion energy supply chain of the future
Next Article TeamPCP worm exploits cloud infrastructure to build criminal infrastructure
user
  • Website

Related Posts

TeamPCP worm exploits cloud infrastructure to build criminal infrastructure

February 9, 2026

OpenClaw integrates VirusTotal scanning to detect malicious ClawHub skills

February 8, 2026

Warning of signal phishing targeting German government agencies, politicians, military personnel and journalists

February 7, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

European offshore wind power for a competitive EU steel industry

TeamPCP worm exploits cloud infrastructure to build criminal infrastructure

BeyondTrust fixes critical pre-authentication RCE vulnerability in remote support and PRA

Working together to build the fusion energy supply chain of the future

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.