BeyondTrust has launched updates to deal with a vital safety flaw impacting Distant Assist (RS) and Privileged Distant Entry (PRA) merchandise that, if efficiently exploited, might end in distant code execution.
“BeyondTrust Distant Assist (RS) and sure older variations of Privileged Distant Entry (PRA) include a vital pre-authentication distant code execution vulnerability,” the corporate mentioned in an advisory launched February 6, 2026.
“By sending specifically crafted requests, an unauthenticated distant attacker might be able to execute working system instructions within the context of the positioning consumer.”
The vulnerability, categorized as an working system command injection, has been assigned the CVE identifier CVE-2026-1731. It is rated 9.9 on the CVSS scoring system.
BeyondTrust mentioned profitable exploitation of the shortcoming might permit an unauthenticated distant attacker to execute working system instructions within the context of the positioning consumer, leading to unauthorized entry, knowledge exfiltration, and repair disruption.
The problem impacts the next variations –
- Distant Assist variations 25.3.1 and prior
- Privileged Distant Entry variations 24.3.4 and prior
It has been patched within the following variations –
- Distant Assist – Patch BT26-02-RS, 25.3.2 and later
- Privileged Distant Entry – Patch BT26-02-PRA, 25.1.1 and later
The corporate can also be urging self-hosted prospects of Distant Assist and Privileged Distant Entry to manually apply the patch if their occasion isn’t subscribed to computerized updates. These operating a Distant Assist model older than 21.3 or on Privileged Distant Entry older than 22.1 are additionally required to improve to a more moderen model to use this patch.
“Self-hosted prospects of PRA can also improve to 25.1.1 or a more moderen model to remediate this vulnerability,” it added.
In keeping with safety researcher and Hacktron AI co-founder Harsh Jaiswal, the vulnerability was found on January 31, 2026, by way of a man-made intelligence (AI)-enabled variant evaluation, including that it discovered about 11,000 cases uncovered to the web. Extra particulars of the flaw have been withheld to provide customers time to use the patches.
“About ~8,500 of these are on-prem deployments, which stay probably susceptible if patches aren’t utilized,” Jaiswal mentioned.
With safety flaws in BeyondTrust Privileged Distant Entry and Distant Assist having come beneath energetic exploitation up to now, it is important that customers replace to the newest model as quickly as doable for optimum safety.










