Hackers Actively Scanning for BeyondTrust RCE Exploit CVE-2026-1731

BLUF

 A critical pre-auth OS command injection → RCE flaw in BeyondTrust RS/PRA (CVE-2026-1731) has broad internet exposure (reporting cites large exposed population), making it highly likely to attract rapid opportunistic scanning and exploit attempts even if confirmed exploitation is not publicly documented yet.

Executive Cost Summary

This cost analysis was developed by the CyberDax team using expert judgment and assisted analytical tools to support clarity and consistency.

“For organizations affected by opportunistic scanning and potential exploitation of the BeyondTrust RS/PRA pre-authentication RCE vulnerability (CVE-2026-1731), costs will primarily stem from urgent containment, accelerated patching, and downstream risk mitigation for privileged access systems.”

·       Low-end total cost: $150K – $400K

o   Rapid patching before compromise, minimal forensic scope required

·       Typical expected range: $600K – $2.5M

o   Short-term exposure window, investigation plus privileged credential resets

·       Upper-bound realistic scenarios: $3M – $8M

o   Confirmed intrusion, broader environment hardening, potential ransomware staging

Key Cost Drivers

·       Scope of exposed RS/PRA infrastructure and privileged connectivity

·       Duration between vulnerability disclosure and patch containment

·       Need for enterprise-wide credential rotation and access review

·       Extent of forensic investigation across privileged systems

·       Business disruption from emergency downtime or remote access restrictions

·       Regulatory exposure if privileged access paths lead to sensitive data

Overall Executive Takeaway

Even in a pre-exploitation phase, a critical pre-auth RCE in a privileged access gateway can realistically drive six- to seven-figure response costs for most mid-to-large enterprises, with upper-bound scenarios reaching $8M if intrusion or ransomware staging occurs.

Potential affected sectors

·       BeyondTrust Remote Support / Privileged Remote Access users, particularly self-hosted.

Potential impacted countries

·       Global

Date of first reported activity

Feb 6, 2026

Date of last reported activity update (last 24h)

·       Feb 11, 2026

Why this matters to defenders

·       RS/PRA are “gateway” tools into privileged environments; pre-auth RCE can be a straight-to-admin path and is a known ransomware precursor class of vulnerability.

Associated APT groups

·       There have been no publicly available ties to an APT group at this time.

Associated criminal organizations

·       There have been no publicly available ties to an criminal organizations at this time.

o   Treat as high-likelihood opportunistic targeting due to exposure and severity.

Tools used in campaign

·       No specific post-exploitation toolset is publicly confirmed in the sources reviewed (yet).

Exposure Assessment Tool

·       Nessus: Plugin 298510 (BeyondTrust Remote Support < 25.3.2 pre-auth RCE)

·       Tenable pipeline references plugin IDs 298510 / 298511 for the issue.

·       Rapid7: authenticated checks availability noted for Feb 9 content release (InsightVM/Nexpose)

IOCs

·       No reliable public IOCs (IPs/domains/hashes) were provided in the sources reviewed because BeyondTrust has not publicly confirmed active exploitation.

Confidence

·       N/A

CVE-2026-1731

CWE-78 OS command injection leading to RCE

Exploitability

·       Very high

o   Network reachable

o   No authentication

o   No user interaction

·       Public PoC exists

o   Do not treat this as proof of exploitation, but it increases risk

Has there been observed exploitation?

·       Vendor and major reporting reviewed state no known active exploitation at this time.

Exposure risk

·       High where RS/PRA is internet-facing, especially self-hosted instances not auto-updated.

Exposure estimates referenced publicly

·       11,000 exposed, with approximately 8,500 on-prem potentially vulnerable if unpatched (as cited in reporting/ETR).

Recommended action

Apply BeyondTrust patches immediately (or upgrade track as required).

If you cannot patch within hours

·       Temporarily restrict exposure (VPN/IP allowlist)

·       Monitor WAF/reverse proxy logs for abnormal request patterns

·       Audit privileged access logs and session telemetry from the vulnerable window.

CVSS vectors (3.1 and 4.0)

 

CVSS 4.0 (CNA: BeyondTrust): CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:H/SA:L

 

CVSS 3.1: NVD base score not provided yet.

Nessus ID

·       298510

·       298511

Is CVE-2026-1731 on the KEV list

·       No

Patching / mitigation data

·       BeyondTrust advisory BT26-02 indicates SaaS patched as of Feb 2, 2026, and provides patch packages/upgrade guidance for self-hosted.

Fixed versions / patch paths

·       Remote Support (RS): Affected 25.3.1 and prior; fixed in 25.3.2+ or via Patch BT26-02-RS (v21.3–25.3.1)

·       Privileged Remote Access (PRA): Affected 24.3.4 and prior; fixed in 25.1.1+ or via Patch BT26-02-PRA (v22.1–24.x)

·       Versions older than RS 21.3 or PRA 22.1 require upgrade to reach patchable releases.

Patch release date

·       Advisory context Feb 6, 2026.

Malware names / family / hashes / decoding key

There have no confirmed in-the-wild payload set published yet).

Verdict

·       URGENT PATCH / PRE-EXPLOIT “HIGH LIKELIHOOD” due to exposure and pre-auth RCE characteristics.

·       Even absent confirmed exploitation, the combination of pre-auth RCE plus broad exposure plus an available proof of concept makes this a high-likelihood targeting vulnerability.

Primary Objectives

Expected if exploited

·       Initial foothold on RS/PRA server

·       Privileged access expansion (credential access, lateral movement)

·       Data access/exfiltration and/or ransomware staging (scenario-based for this class of asset)





Figure 2 MITRE Att&ck Chain Chart

TTPs

Initial Access

·       T1190 Exploit Public-Facing Application

o   Crafted requests trigger pre-auth command execution on RS/PRA.

Execution

·       T1059 Command and Scripting Interpreter

o   Attacker executes OS commands in the site-user context post-trigger.

Post-Exploitation

Likely, not publicly confirmed for this CVE

·       T1105 Ingress Tool Transfer

o   Fetch additional tooling once code execution is obtained.

·       T1021 Remote Services

o   Leverage harvested creds/privilege to pivot.

·       T1486 Data Encrypted for Impact

o   Ransomware outcomes if access is maintained.

 



Figure 3 TTP MITRE Att&ck Chain flow

Threat Actor Context

·       No specific actor attribution for CVE-2026-1731.

Behavior Analysis

High-signal behaviors on RS/PRA hosts:

·       External requests immediately followed by creation of suspicious child processes (shells, scripting engines)

·       Unusual modifications to RS/PRA configuration, users, or auth integrations

·       Outbound connections newly initiated by RS/PRA host (downloaders, tunnels, C2-like patterns)

These are detection pivots; they are not “confirmed” for this specific CVE.

Expected User-Agent Patterns

·       Not publicly available for this CVE.

·       If opportunistic scanning begins, typical scanner UAs (low-confidence) may include:

o   curl/*, python-requests/*, Go-http-client/*

o   Confidence: Low (heuristic; not sourced)

Payload Examples

·       There are no publicly available exploit payload strings or step-by-step exploitation details.

Defensive “payload indicators” you can hunt for in logs instead:

·       Requests containing command-injection metacharacters (;, |, `, $() in unexpected parameters/JSON fields

·       Abnormal WebSocket/HTTP request spikes to RS/PRA endpoints followed by immediate server-side process creation

Log Artifacts (high-value)

Reverse proxy/WAF logs

·       Unusual inbound bursts to RS/PRA, large or malformed requests, suspicious metacharacters

OS audit logs (Windows Security / Sysmon, Linux auditd)

·       New process creation where parent is RS/PRA service

BeyondTrust appliance/application logs

·       Unexpected admin actions, config changes, session creation anomalies

Detection Coverage by Control Type

(practical)

·       Preven

o   Patch/upgrade; remove internet exposure; allowlist admin access.

·       Detect

o   Process creation anomalies; new persistence; suspicious outbound.

·       Respond

o   Isolate RS/PRA host; rotate privileged creds; review privileged access sessions.

Suggested Rules / Potential Hunts

Suricata

·       Suspicious metacharacters in HTTP request to RS/PRA hosts

o   Tune

§  Apply only to RS/PRA destination IPs/ports to reduce noise.

 

alert http $EXTERNAL_NET any -> $HOME_NET any (

  msg:"POSSIBLE Command Injection Attempt (metacharacters) targeting RS/PRA";

  flow:established,to_server;

  http.method; content:"POST"; nocase;

  pcre:"/(\%3b|;|\%7c|\||\%60|`|\%24\(|\$\()/Ui";

  classtype:web-application-attack;

  sid:9902001; rev:1;

)

SentinelOne

·       RS/PRA service spawning shells/scripting

EventType = Process Creation

AND (ProcessName In ("cmd.exe","powershell.exe","bash","sh","python","perl","nc","curl","wget"))

AND (ParentProcessName ContainsCIS ("beyondtrust")

     OR ParentProcessPath ContainsCIS ("beyondtrust")

     OR ParentProcessCommandLine ContainsCIS ("beyondtrust"))

Splunk

·       Inbound spike to RS/PRA + rapid process execution (requires proxy + endpoint logs)

(

  index=proxy (dest_host IN ("<RS_PRA_HOST1>","<RS_PRA_HOST2>")) earliest=-15m

  | stats count as req_count, values(src_ip) as src by dest_host span=1m _time

)

| join dest_host _time

    [ search index=endpoint host IN ("<RS_PRA_HOST1>","<RS_PRA_HOST2>") earliest=-15m

      (process_name IN ("cmd.exe","powershell.exe","bash","sh","python","perl","curl","wget"))

      | stats values(process_name) as procs values(parent_process_name) as parents by host span=1m _time ]

| where req_count > 50

| sort - req_count

 

·       Detect suspicious characters in URI/query (proxy/WAF)

index=proxy (dest_host IN ("<RS_PRA_HOST1>","<RS_PRA_HOST2>"))

| where match(uri_query, "(%3b|;|%7c|\\||%60|`|%24\\(|\\$\\()")

| stats count values(src_ip) values(useragent) by dest_host uri_path

Sigma

(process creation) – RS/PRA spawning command interpreters

title: BeyondTrust RS/PRA Suspicious Child Process Execution

id: 6c5dcb2e-7b12-4b9a-a0d5-79d26b0b7f9d

status: experimental

logsource:

  product: windows

  category: process_creation

detection:

  selection:

    ParentImage|contains:

      - "BeyondTrust"

      - "beyondtrust"

    Image|endswith:

      - '\cmd.exe'

      - '\powershell.exe'

      - '\wscript.exe'

      - '\cscript.exe'

  condition: selection

falsepositives:

  - Administrative scripts launched legitimately from the RS/PRA host

level: high

YARA

·       Suspicious command-injection metachar presence in captured request bodies/files

o   Rule Possible_Command_Injection_Metachars_Generic

{

  meta:

    description = "Detects common command-injection metacharacter patterns in logs/request captures"

    author = "Defender"

  strings:

    $m1 = ";"

    $m2 = "|"

    $m3 = "`"

    $m4 = "$("

  condition:

    2 of ($m*)

}

Delivery Methods

·       Exploitation of internet-exposed RS/PRA via crafted requests (pre-auth RCE).

Steps to Consider Over the Next 7 Days

·       Day 0–1

o   Inventory and identify internet-exposed RS/PRA; run vuln scans (Nessus 298510) and authenticated checks.

·       Day 0–1

o   Patch/upgrade per BT26-02; confirm RS ≥ 25.3.2 and PRA ≥ 25.1.1 (or apply vendor patch in supported ranges).

·       Day 1–2

o   Implement temporary compensating controls: VPN/IP allowlists, WAF rules for metachar patterns, rate limiting.

·       Day 2–4

o   Hunt for suspicious child processes and new persistence on RS/PRA hosts; review admin actions and sessions.

·       Day 4–7

o   Rotate credentials used by RS/PRA service accounts; review privileged access integrations; harden egress from RS/PRA host.

References

https://www.beyondtrust.com/trust-center/security-advisories/bt26-02

https://nvd.nist.gov/vuln/detail/CVE-2026-1731

https://www.rapid7.com/blog/post/etr-cve-2026-1731-critical-unauthenticated-remote-code-execution-rce-beyondtrust-remote-support-rs-privileged-remote-access-pra/

https://www.tenable.com/plugins/nessus/298510

https://www.techradar.com/pro/security/beyondtrust-rce-flaw-lets-hackers-run-code-without-logging-in

https://github.com/win3zz/CVE-2026-1731

Previous
Previous

Deepfake Zoom ClickFix UNC1069 macOS Crypto Credential and Session Theft

Next
Next

Phorpiex “Your Document” LNK Phishing leads to GLOBAL GROUP Ransomware