BeyondTrust CVE-2026-1731: Critical Pre-Auth RCE in Privileged Access Tools Hits CISA KEV
A near-maximum severity CVE-2026-1731 (CVSSv4 9.9) in BeyondTrust Remote Support and Privileged Remote Access allows unauthenticated remote code execution via a trivially simple WebSocket exploit, now actively exploited in the wild.
BeyondTrust disclosed CVE-2026-1731 on February 6, 2026, a critical vulnerability in its Remote Support (RS) and Privileged Remote Access (PRA) products with a CVSSv4 score of 9.9 — near the maximum possible severity rating. The flaw allows an unauthenticated remote attacker to execute arbitrary code on the target system via a crafted WebSocket message.
Trivially Simple Exploitation
Rapid7's analysis of the vulnerability describes the exploitation mechanism as "trivially simple." An attacker sends a WebSocket message to the BeyondTrust appliance containing a crafted version string. The version string is processed without adequate validation, leading to code execution in the context of the BeyondTrust service. No authentication, no credentials, no multi-step chain — a single network request to an exposed BeyondTrust appliance is sufficient for full compromise.
The simplicity of the exploit is a significant factor in its risk assessment. Complex exploitation chains provide a natural barrier to mass exploitation because they require specialized knowledge and tooling. A trivially simple pre-authentication RCE removes that barrier, enabling both sophisticated threat actors and less-skilled attackers to compromise vulnerable systems.
Active Exploitation Timeline
BeyondTrust released the fix in version 25.3.2. For hosted (cloud) instances, the patch was auto-deployed on February 2, 2026 — four days before public disclosure. Self-hosted instances required manual update. The first observed exploitation attempt was detected on February 10, 2026. CISA added CVE-2026-1731 to its Known Exploited Vulnerabilities catalog on February 13, triggering mandatory remediation timelines for US federal agencies.
Palo Alto Networks' Unit 42 threat intelligence team identified VShell and SparkRAT as malware deployed in post-exploitation activity following successful CVE-2026-1731 exploitation. VShell is a cross-platform remote access tool, and SparkRAT is an open-source RAT written in Go — both consistent with threat actors establishing persistent access for future operations rather than one-time data theft.
Why BeyondTrust Matters
BeyondTrust's Remote Support and Privileged Remote Access products are deployed by large enterprises and government agencies specifically to manage privileged access to sensitive systems. These appliances sit at a critical juncture in network architecture: they provide authorized remote access to servers, workstations, and infrastructure components that would otherwise be isolated. Compromising a BeyondTrust appliance gives an attacker the same vantage point as an authorized administrator — broad network visibility and legitimate-looking access to downstream systems.
Organizations running self-hosted BeyondTrust RS or PRA versions 25.3.1 or earlier should treat the update to 25.3.2 as a top-priority emergency patch. Given the trivial exploitation requirements and confirmed in-the-wild activity, any delay in patching exposed instances carries substantial risk of compromise.
Related Articles
Cloudflare 2026 Threat Report: 230 Billion Daily Blocked Threats and the Rise of Credential Attacks
Cloudflare has published its inaugural annual threat report revealing the company blocks over 230 billion threats daily across 20% of global web traffic. DDoS attacks doubled year-over-year to 47.1 million incidents, with the largest reaching a record 31.4 Tbps, while bots now account for 94% of all login attempts.
HashiCorp Patches Consul Arbitrary File Read Vulnerability in Kubernetes Auth
HashiCorp has released emergency patches for Consul to address CVE-2026-2808, a medium-severity vulnerability allowing arbitrary file reads when Kubernetes authentication is enabled. The fix also adds HTTP server timeouts to prevent Slowloris denial-of-service attacks against Consul agent endpoints.
Let's Encrypt Now Issues Six-Day Certificates and IP Address Certificates via Certbot
Let's Encrypt and the EFF have announced support for six-day (160-hour) certificates and IP address certificates through Certbot 5.3 and 5.4. The ultra-short-lived certificates reduce the impact window of compromised keys by design, while IP address certificates enable HTTPS for services identified by address rather than hostname.