February 10 Advisory: BeyondTrust Remote Support and Privileged Remote Access Flaw Allows Pre-Authentication RCE [CVE-2026-1731]

Vulnerability Description

A critical pre-authentication remote code execution vulnerability (CVSSv4 9.9) affecting BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) products was published on February 6, 2026. The vulnerability is an OS command injection flaw that allows an unauthenticated remote attacker to execute operating system commands in the context of the site user by sending specially crafted requests, with no authentication or user interaction required.

Map of exposed hosts

See the full breakdown by country in Censys Platform →

FieldDescription
CVE-IDCVE-2026-1731  — CVSSv4 9.9 — assigned by BeyondTrust
Vulnerability DescriptionAn OS command injection flaw in BeyondTrust RS and PRA products allows an unauthenticated remote attacker to execute operating system commands in the context of the site user with no authentication or user interaction required.
Date of DisclosureFebruary 6, 2026
Affected AssetsBeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) products
Vulnerable Software VersionsRemote Support versions prior to 25.3.2 and Privileged Remote Access versions prior to 25.1.1 are affected.
PoC AvailableNo public PoCs are available at time of writing, but the attack is straightforward to exploit, so it is important to patch as quickly as possible.
Exploitation StatusAt time of writing, there are currently no confirmed reports of this vulnerability being exploited in the wild
Patch StatusPatches are available. BeyondTrust released advisory BT26-02 on February 6, 2026, stating that this is fixed in Remote Support 25.3.2 and later, and in Privileged Remote Access 25.1.1 and later.

Censys Perspective

At time of writing, Censys sees 190,832 exposed web properties, trackable with the following queries:

Platform 

(host.services.software:(vendor:"BeyondTrust" and product:{"Remote Support", "Privileged Remote Access"}) or web.software:(vendor:"BeyondTrust" and product:{"Remote Support", "Privileged Remote Access"})) and not labels: "HONEYPOT"

ASM

host.services.software: (vendor="BeyondTrust" and product: {"Remote Support", "Privileged Remote Access"}) or web_entity.instances.software: (vendor="BeyondTrust" and product: {"Remote Support", "Privileged Remote Access"})

Legacy Search

services.software: (vendor="BeyondTrust" and product: {"Remote Support", "Privileged Remote Access"}) and not labels: {honeypot, tarpit}

References