Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Hackers probe, exploit newly patched BeyondTrust RCE flaw (CVE-2026-1731)
    Cybersecurity

    Hackers probe, exploit newly patched BeyondTrust RCE flaw (CVE-2026-1731)

    adminBy adminFebruary 13, 2026No Comments2 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    BeyondTrust fixes easy-to-exploit pre-auth RCE vulnerability in remote access tools (CVE-2026-1731)
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Attackers are exploiting a recently patched critical vulnerability (CVE-2026-1731) in internet-facing BeyondTrust Remote Support and Privileged Remote Access instances.

    “Attackers are abusing get_portal_info to extract the x-ns-company value before establishing a WebSocket channel,” Ryan Dewhurst, Head of Threat Intelligence at watchTowr, confirmed on Thursday.

    Rapid7 researchers published a technical analysis and proof-of-concept (PoC) exploit for CVE-2026-1731 on Tuesday, Feb. 10.

    Defused Cyber and GreyNoise have also detected widespread reconnaissance and limited exploitation activity.

    “So far we have observed exploits leveraging the Nuclei script, but no other variations of the exploit,” Defused Cyber said.

    Reconnaissance activity

    CVE-2026-1731 is an OS command injection vulnerability that allows unauthenticated attackers to execute arbitrary commands on a BeyondTrust Remote Support or Privileged Remote Access instance.

    The vulnerability is in the same endpoint (get_portal_info) as CVE-2024-12356, which was exploited as a zero-day by Chinese state-sponsored attackers in 2024 to breach the US Treasury Department.

    GreyNoise researchers say it is effectively a variant of CVE-2024-12356: “Same WebSocket endpoint, different code path.”

    The threat intelligence company, which specializes in analyzing activity targeting internet-facing systems, says that internet-wide scanning and reconnaissance activity surged on Wednesday, Feb. 11, and that it mostly originates from a single IP associated with a known scanning operation.

    “Standard BeyondTrust deployments run on HTTPS (port 443), but few sessions target that port. The rest systematically probed clusters of non-standard ports, suggesting the attackers know that enterprises often move BeyondTrust to non-default ports for security-through-obscurity,” the company also noted.

    What to do?

    BeyondTrust applied a patch for CVE-2026-1731 to all Remote Support SaaS and Privileged Remote Access SaaS customers on February 2, and urged customers with on-prem instances to patch quickly.

    Organizations that have failed to do it should assume compromise and investigate.

    Subscribe to our breaking news e-mail alert to never miss out on the latest breaches, vulnerabilities and cybersecurity threats. Subscribe here!

    BeyondTrust CVE20261731 exploit Flaw hackers newly patched probe RCE
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleFrom Article to Short-Form Video That Holds Attention
    Next Article I turned my old gaming PC into an AI assistant that’s actually useful
    admin
    • Website

    Related Posts

    Police dismantles online gambling ring exploiting Ukrainian women

    March 5, 2026

    Cisco Warns of More Catalyst SD-WAN Flaws Exploited in the Wild

    March 5, 2026

    Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks

    March 5, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    4 Methods to Find Keywords Your Competitors Miss

    March 5, 2026

    My Samsung camera is infinitely better since I tweaked these settings

    March 5, 2026

    Police dismantles online gambling ring exploiting Ukrainian women

    March 5, 2026

    If AI Can’t Read Your CMS, It Can’t Recommend Your Brand [Webinar]

    March 5, 2026
    Categories
    • Blogging (33)
    • Cybersecurity (614)
    • Privacy & Online Earning (91)
    • SEO & Digital Marketing (389)
    • Tech Tools & Mobile / Apps (753)
    • WiFi / Internet & Networking (109)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    4 Methods to Find Keywords Your Competitors Miss

    March 5, 2026

    My Samsung camera is infinitely better since I tweaked these settings

    March 5, 2026

    Police dismantles online gambling ring exploiting Ukrainian women

    March 5, 2026
    Most Popular
    • 4 Methods to Find Keywords Your Competitors Miss
    • My Samsung camera is infinitely better since I tweaked these settings
    • Police dismantles online gambling ring exploiting Ukrainian women
    • If AI Can’t Read Your CMS, It Can’t Recommend Your Brand [Webinar]
    • The Aiper Experts Duo with Cognitive AI is the closest thing to a self-cleaning pool
    • Cisco Warns of More Catalyst SD-WAN Flaws Exploited in the Wild
    • Walmart Has a Preorder Deal on the New M4 iPad Air
    • Google removes accessibility section from JavaScript SEO section
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.