CISA Gives Feds 3 Days to Patch Actively Exploited BeyondTrust Flaw
13 Articles
13 Articles
BeyondTrust RCE Exploited for Domain Control
Attackers are actively exploiting a vulnerability in BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) to remotely run commands and escalate to full domain control in some environments. The flaw affects self-hosted deployments and can be triggered without authentication. We “… observed attempts to deploy the SimpleHelp RMM tool for persistence, along with discovery and lateral movement activities,” said Arctic Wolf researchers.…
Attackers Exploit Critical BeyondTrust Flaw to Seize Full Active Directory Control - Cybernoz - Cybersecurity News
A critical vulnerability, CVE-2026-1731, affecting self-hosted BeyondTrust Remote Support and Privileged Remote Access deployments. This security flaw allows unauthenticated attackers to inject operating system commands, effectively granting them remote code execution capabilities. The severity of this campaign has prompted the Cybersecurity and Infrastructure Security Agency (CISA) to add the flaw to its Known Exploited Vulnerabilities (KEV) ca…
Already one day after the release of a proof-of-concept exploit, attackers have begun to target a recently patched critical vulnerability in BeyondTrust products. After a functioning proof-of-concept appeared in early February, security providers registered after 24 hours of first attempts to attack the vulnerability classified as CVE-2026-1731. Unauthenticated code execution possible The vulnerability affects BeyondTrust Remote Support and Priv…
Legacy BeyondTrust Appliances Under Siege: How End-of-Life Remote Support Systems Became a Gateway for Active Exploitation
A critical vulnerability in BeyondTrust’s Remote Support (RS) product line — formerly known as Bomgar — is being actively exploited in the wild, exposing organizations that have failed to retire or patch aging remote access appliances to serious risk. The attacks, which security researchers have been tracking in recent weeks, underscore the persistent danger posed by legacy infrastructure that lingers in enterprise environments long after vendor…
Coverage Details
Bias Distribution
- 100% of the sources are Center
Factuality
To view factuality data please Upgrade to Premium








