Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»BeyondTrust RCE flaw now exploited in ransomware attacks
    Cybersecurity

    BeyondTrust RCE flaw now exploited in ransomware attacks

    adminBy adminFebruary 20, 2026No Comments2 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    CISA: BeyondTrust RCE flaw now exploited in ransomware attacks
    Share
    Facebook Twitter LinkedIn Pinterest Email

    CISA: BeyondTrust RCE flaw now exploited in ransomware attacks

    Hackers are actively exploiting the CVE-2026-1731 vulnerability in the BeyondTrust Remote Support product, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) warns.

    The security issue affects BeyondTrust’s Remote Support 25.3.1 or earlier and Privileged Remote Access 24.3.4 or earlier, and can be exploited for remote code execution.

    CISA added it to the Known Exploited Vulnerabilities (KEV) catalog on February 13 and gave federal agencies just three days to apply the patch or stop using the product.

    Wiz

    BeyondTrust initially disclosed CVE-2026-1731 on February 6. The security advisory classified it as a pre-authentication remote code execution vulnerability caused by an OS command injection weakness, exploitable via specially crafted client requests sent to vulnerable endpoints.

    Proof-of-concept (PoC) exploits for CVE-2026-1731 became available shortly after, and in-the-wild exploitation started almost immediately.

    On February 13, BeyondTrust updated the bulletin  to say that exploitation had been detected on January 31, making CVE-2026-1731 a zero-day vulnerability for at least a week.

    BeyondTrust states that the report from researcher Harsh Jaiswal and the Hacktron AI team confirmed the anomalous activity that they detected on a single Remote Support appliance at the time.

    CISA has now activated the ‘Known To Be Used in Ransomware Campaigns?’ indicator in the KEV catalog.

    For customers of the cloud-based application (SaaS), the vendor states the patch was applied automatically on February 2, so no manual intervention is needed.

    Customers of the self-hosted instances need to either enable automatic updates and verify that the patch was applied via the ‘/appliance’ interface or manually install it.

    For Remote Support, the recommendation is to install version 25.3.2. Privileged Remote Access users should switch to version 25.1.1 or newer.

    Those still at RS v21.3 and PRA v22.1 are recommended to upgrade to a newer version before applying the patch.


    tines

    Modern IT infrastructure moves faster than manual workflows can handle.

    In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.

    attacks BeyondTrust Exploited Flaw ransomware RCE
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleNothing teases the next evolution of the Glyph
    Next Article The Galaxy S26 disappointment narrative is getting out of hand
    admin
    • Website

    Related Posts

    DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More

    March 5, 2026

    Cisco warns of SD-WAN Manager exploitation, fixes 48 firewall vulnerabilities

    March 5, 2026

    Police dismantles online gambling ring exploiting Ukrainian women

    March 5, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    What AI means for the future of SEO [Expert Tips & Interview]

    March 5, 2026

    200+ AI audits reveal why some industries struggle in AI search

    March 5, 2026

    DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More

    March 5, 2026

    A Survey of 1,000+ US Consumers

    March 5, 2026
    Categories
    • Blogging (33)
    • Cybersecurity (616)
    • Privacy & Online Earning (92)
    • SEO & Digital Marketing (392)
    • Tech Tools & Mobile / Apps (754)
    • WiFi / Internet & Networking (110)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    What AI means for the future of SEO [Expert Tips & Interview]

    March 5, 2026

    200+ AI audits reveal why some industries struggle in AI search

    March 5, 2026

    DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More

    March 5, 2026
    Most Popular
    • What AI means for the future of SEO [Expert Tips & Interview]
    • 200+ AI audits reveal why some industries struggle in AI search
    • DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More
    • A Survey of 1,000+ US Consumers
    • I finally upgraded to a mesh Wi-Fi system and it made me realize Wi-Fi extenders are a scam
    • Lack of regulatory action on hyperscaler dominance prompts inquiry chair to quit
    • Cisco warns of SD-WAN Manager exploitation, fixes 48 firewall vulnerabilities
    • The Government Uses Targeted Advertising to Track Your Location. Here’s What We Need to Do.
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.