Insights

Exploitation of BeyondTrust Remote Support and Privileged Remote Access (CVE-2026-1731)

As an Assured Cyber Incident Response provider, we are sharing the NCSC’s guidance on vulnerability CVE-2026-1731 to help organisations understand the potential risk and take any necessary action. we recommend reviewing the advice carefully. See NCSC advice below:

The NCSC are directly aware of the attempted and successful exploitation of CVE-2026-1731.

The NCSC advises organisations to ensure remedial action has been taken to mitigate vulnerability CVE-2026-1731 affecting BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA).

The following product versions are known to be vulnerable:

  • BeyondTrust Remote Support 25.3.1 and prior
  • BeyondTrust Privileged Remote Access 24.3.4 and prior

What has happened?

BeyondTrust Remote Support and older versions of Privileged Remote Access contain a critical pre-authentication remote code execution vulnerability that may be triggered through specially crafted client requests. Successful exploitation could allow an unauthenticated remote attacker to execute operating system commands in the context of the site user and may lead to system compromise, including unauthorised access, data exfiltration, and service disruption. The vendor published an advisory and software updates to mitigate the vulnerability.

Exploitation

The vendor is aware of active exploitation against a limited number of self-hosted customers. Observed exploitation activity has been limited to internet-facing, self-hosted environments where the update had not been applied before 9th February 2026.

What Should I Do?

The vendor has already taken steps to address this vulnerability and notify customers as detailed in the advisory.

The NCSC recommends following vendor best-practice advice to mitigate vulnerabilities. In this case, if you use an affected product, you should take these priority actions:

1. Fully investigate for evidence of compromise using an assured Cyber Incident Response provider. If you are unable to do this, you should fully rebuild the device.

2. If you believe you have been compromised and are in the UK, you should report it.

3. If the BeyondTrust update service is enabled, you should verify the updates were installed successfully.

4. For self-hosted installations, due to the period of exposure, rebuilding the device before installing the latest version is advised.

5. Apply any appropriate security hardening.

6. Perform continuous threat hunting activities.

Further Resources

NCSC resources to help secure systems:

If you think your organisation may be affected, or you would like support understanding your exposure and next steps, please get in touch for a no-obligation chat with our team. We are here to help you assess the situation and respond appropriately.

About the author

GC Headshot Final
George Chapman
George Chapman is a Senior Security Consultant with a background spanning red teaming, incident response, penetration testing, and vulnerability research. His work bridges offensive and defensive disciplines, enabling him to deliver robust security evaluations and strategic guidance that help organisations identify weaknesses and improve their overall cyber maturity.
the-cyber-scheme
pci
Crest
cbest
CHECK Penetration Testing (Dark Logo)
Cyber Incident Exercising
Cyber Incident Response Standard Level logo

Experiencing a security breach?
Contact the cyber security experts now