CVE-2026-1731 – BeyondTrust Remote Support (RS) & Privileged Remote Access (PRA) Critical Pre-Authentication Remote Code Execution Vulnerability

CVSS 9.8 CRITICAL

“A dangerous command-injection weakness in BeyondTrust tools allows attackers to take control without ever logging in.”

BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability identified as CVE-2026-1731. The issue is caused by improper input handling that allows attackers to inject and execute operating system commands. The vulnerability has a CVSS base score of 9.9 (Critical), reflecting how easily it can be exploited and the severe impact if abused.

An unauthenticated remote attacker can exploit this weakness over the network without valid credentials or user interaction. Successful exploitation allows execution of arbitrary commands on the affected system, potentially leading to full system compromise, theft of sensitive data, service outages, and further movement inside the network. Because these products are often deployed with high privileges and exposed to administrators, the risk is especially high in enterprise environments.

BeyondTrust released patches to address the issue. SaaS deployments were automatically updated, while self-hosted environments must apply the vendor-provided updates to remediate the vulnerability. At the time of disclosure, no confirmed widespread real-world exploitation had been reported, but the simplicity and impact of the attack make this vulnerability particularly dangerous if left unpatched.

Key Details

Affected Product
Beyondtrust Privileged Remote Access
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
CWE Classification
CWE-78
Patch this CVE on all your endpoints in under 5 minutes. First 200 endpoints are free forever, scale as needed.