Active Exploitation of Critical BeyondTrust CVSS 9.9

Security researchers have confirmed active exploitation of a critical vulnerability affecting BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA). The flaw, tracked as CVE-2026-1731, carries a CVSS score of 9.9 and allows unauthenticated remote code execution.

According to watchTowr, attackers are abusing the get_portal_info function to extract sensitive values before establishing a WebSocket connection. Successful exploitation can lead to unauthorized access, data theft, and service disruption.

Security fixes are already available:

  • Remote Support — Patch BT26-02-RS (v21.3–25.3.1)
  • Privileged Remote Access — Patch BT26-02-PRA (v22.1–24.X)
  • PRA version 25.1+ is not affected

The vulnerability has also been added to the KEV catalog by CISA, highlighting real-world risk.

Bottom line:
Organizations should patch immediately, restrict external access to BeyondTrust portals, and monitor for suspicious activity to reduce the risk of compromise.

source: https://thehackernews.com/2026/02/researchers-observe-in-wild.html