BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability. By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user.
https://www.securityweek.com/beyondtrust-vulnerability-exploited-in-ransomware-attacks/
https://www.databreachtoday.com/hospitals-at-risk-beyondtrust-ransomware-hacks-a-30818
https://thehackernews.com/2026/02/beyondtrust-flaw-used-for-web-shells.html
https://unit42.paloaltonetworks.com/beyondtrust-cve-2026-1731/
Published: 2026-02-06
Updated: 2026-02-17
Known Exploited Vulnerability (KEV)
Base Score: 10
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Severity: Critical
Base Score: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: Critical
Base Score: 9.9
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:H/SA:L
Severity: Critical
EPSS: 0.60924
Tenable Research has classified this CVE under the following Vulnerability Watch classification, which includes active and historical (inactive) classifications. You can learn more about these classifications on our blog.
Vulnerability of Interest