Introduction

A critical vulnerability (CVE-2026-1731, CVSS 9.9) was publicly disclosed on February 6, 2026 affecting BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA). The flaw allows unauthenticated attackers to achieve full remote code execution via a crafted WebSocket message (WebSocket is a persistent, bidirectional communication channel between a client and server, commonly used for real-time features) sent to an internet-facing endpoint, requiring no credentials, no user interaction, and only low complexity. Active exploitation has been confirmed by multiple independent sources including GreyNoise, watchTowr, and Arctic Wolf, with attacks observed within 24 hours of public PoC availability. Immediate patching is required.

Quick Overview

AttributeDetails
CVECVE-2026-1731
SeverityCritical (CVSS 9.9 v4.0 / 9.8 v3.1)
CWECWE-78 (OS Command Injection)
Affected ProductsBeyondTrust Remote Support (RS), Privileged Remote Access (PRA)
Affected VersionsRS 25.3.1 and prior; PRA 24.3.4 and prior (PRA 25.1+ is not affected)
Attack VectorNetwork
Authentication RequiredNone
Exploit ComplexityLow
User InteractionNone
Active ExploitationYes, confirmed (GreyNoise, watchTowr, Arctic Wolf, Darktrace)
PoC AvailableYes, public (multiple GitHub repositories including win3zz, referenced by CISA)
CISA KEVYes (added February 13, 2026; verify due date in official KEV catalog)
Fix AvailableYes: RS 25.3.2+ / PRA 25.1.1+

What Is BeyondTrust Remote Support & Privileged Remote Access?

BeyondTrust Remote Support (RS) is an enterprise remote access tool that lets IT teams and help desks connect to and control endpoints. Think of it as the enterprise-grade version of tools like TeamViewer or AnyDesk. Privileged Remote Access (PRA) extends that concept specifically for managing privileged sessions: it brokers, monitors, and records connections to sensitive systems while storing the credentials needed to access them.

This is exactly why a vulnerability in these products is so dangerous. BeyondTrust appliances are designed to be internet-facing by default and they hold the keys to an organization’s most sensitive infrastructure. Compromising one doesn’t just give an attacker a single server. It gives them the credential vault, the session recordings, and a direct tunnel into every system the appliance manages. BeyondTrust states that approximately 75% of the Fortune 100 use its products, and researchers at Hacktron AI identified roughly 11,000 internet-facing instances via Shodan and Fofa at the time of disclosure, of which approximately 8,500 are on-premises deployments that remain potentially vulnerable if not patched (SaaS instances were automatically remediated).

Technical Analysis

The Root Cause: Unsafe Bash Arithmetic Evaluation

The vulnerability lives in a shell script called thin-scc-wrapper that is reachable through the /nw WebSocket URI. This is the same endpoint that was exploited as a zero-day in December 2024 (CVE-2024-12356) in a high-profile nation-state attack, but through a different code path.

The root cause is a classic CWE-78 (OS Command Injection), but the injection mechanism is a particularly interesting one that many developers don’t think about: Bash arithmetic evaluation. In Bash, when you write something like $(( $user_input )) to do a numeric comparison, the shell doesn’t just treat the content as a number. Bash arithmetic contexts evaluate nested command substitutions, meaning if $user_input contains a[$(whoami)], the shell will actually execute whoami before attempting the arithmetic. This is by design in Bash, but it’s a dangerous footgun when user-controlled input reaches an arithmetic expression without sanitization.

In BeyondTrust’s case, the thin-scc-wrapper script takes a remoteVersion parameter from incoming WebSocket messages and feeds it into a Bash numeric comparison to determine protocol compatibility. Because the WebSocket endpoint does not require authentication and the script does not sanitize the version string, an attacker can inject arbitrary OS commands that execute in the context of the site user, which is the service account running the BeyondTrust appliance.

Attack Flow

  1. Reconnaissance: The attacker sends a GET request to /get_portal_info to extract the x-ns-company value, a configuration identifier required to establish a valid WebSocket session.
  2. WebSocket connection: Using the company value, the attacker initiates a WebSocket connection to the /nw endpoint, which is normally used for client-appliance protocol negotiation.
  3. Payload injection: The attacker sends a WebSocket message containing a newline-delimited sequence that includes a malicious remoteVersion parameter. The documented PoC payload uses the format a[$(touch /tmp/pwned)], but any arbitrary command can be substituted. This value reaches the Bash arithmetic evaluation in thin-scc-wrapper.
  4. Command execution: Bash evaluates the nested command substitution within the arithmetic context, executing the attacker’s payload as the site user on the underlying operating system. The attacker now has full OS-level access to the appliance.

Why Existing Protections Don’t Help

The critical factor is that the /nw WebSocket endpoint is exposed to the internet by design. It’s how legitimate BeyondTrust clients connect to the appliance. There is no authentication layer between the internet and the vulnerable code path. Web Application Firewalls (WAFs) may not inspect WebSocket frame content by default, and because the payload is embedded in what looks like a version negotiation parameter, it doesn’t trigger standard injection signatures. The commands execute at the OS level, below any application-layer access controls.

Affected Versions

BranchVulnerable VersionsFixed VersionPatch IDPatch Applies To
Remote Support (RS)25.3.1 and all prior versions25.3.2+BT26-02-RSRS 21.3 through 25.3.1
Privileged Remote Access (PRA)24.3.4 and all prior versions25.1.1+BT26-02-PRAPRA 22.1 through 24.3.4

Important Notes

  • PRA 25.1 and later are not affected by this vulnerability and do not require patching.
  • SaaS/cloud customers were automatically patched on February 2, 2026 and do not need to take action.
  • Self-hosted customers must manually download and apply the BT26-02 patch, or upgrade to the fixed version.
  • Organizations running RS versions older than 21.3 or PRA versions older than 22.1 must first upgrade to a supported release before the patch can be applied. These legacy versions are still vulnerable but cannot receive the patch directly.
  • The December 2024 patch for CVE-2024-12356 does not cover this vulnerability. Both target the same WebSocket endpoint, but CVE-2026-1731 exploits a different code path within it. Organizations that applied the earlier patch must still apply BT26-02.

Threat Status

Exploitation Activity: Active exploitation is confirmed by multiple independent sources. BeyondTrust’s own advisory states the first exploitation attempt was observed on February 10, 2026, the same day the first public PoCs appeared. By February 11, GreyNoise’s Global Observation Grid detected scanning surges, with a single IP address responsible for 86% of observed probe traffic. This IP was operating from a commercial VPN in Frankfurt and simultaneously targeting SonicWall, MOVEit, Log4j, and other high-value attack surfaces, which suggests a sophisticated multi-exploit operator rather than an opportunistic scanner. watchTowr’s Head of Threat Intelligence Ryan Dewhurst confirmed in-the-wild exploitation on February 12 across their global sensor network. Arctic Wolf and Darktrace independently corroborated exploitation activity in customer environments. Notably, GreyNoise observed attackers probing non-standard ports beyond 443, indicating awareness that some enterprises relocate BeyondTrust off default ports.

PoC Availability: Multiple public proof-of-concept exploits are available. Rapid7 published a detailed technical analysis and PoC on February 10, and security researcher win3zz published a separate PoC on GitHub the same day. CISA references the latter in its official CVE record. At least four public repositories now exist, including Nuclei-based scanner templates. Defused Cyber confirmed attackers are leveraging these automated scripts for mass exploitation. The exploit itself is trivially simple: it’s essentially a WebSocket message with a crafted version string.

Attribution: No specific threat actor attribution has been published for CVE-2026-1731 exploitation at this time. However, it is worth noting that the same WebSocket endpoint was previously exploited as a zero-day by what the U.S. government attributed to the Chinese state-sponsored group Silk Typhoon (also known as Hafnium) in a high-profile December 2024 breach of a federal agency. GreyNoise sensors also caught a malicious IP replaying the earlier exploit chain (CVE-2024-12356 + CVE-2025-1094) in January 2026, before CVE-2026-1731 was even discovered, which suggests sustained nation-state interest in BeyondTrust’s attack surface. No definitive connection between those earlier activities and the current exploitation wave has been established.

Why This Matters: Three reasons this CVE stands out from the noise

First, BeyondTrust appliances are purpose-built gateways to privileged access. Unlike a vulnerability in a typical web application where the blast radius is limited to that application’s data, compromising a PRA appliance gives attackers direct access to the credential vault: stored passwords, SSH keys, and session tokens for the most sensitive systems in an organization. Arctic Wolf documented a complete post-exploitation playbook observed in active incidents: attackers deployed SimpleHelp RMM (a legitimate remote monitoring and management tool, repurposed as a persistent backdoor) as renamed binaries saved to C:\ProgramData\, created new domain administrator accounts, enumerated Active Directory using AdsiSearcher, and moved laterally via PSExec and Impacket. This is not theoretical. It is the observed kill chain.

Second, the discovery-to-exploitation timeline is a case study in how fast the game moves now. On January 30, watchTowr published a technical analysis of CVE-2026-1281, an arithmetic evaluation injection in Ivanti EPMM, documenting the bug pattern in detail. On January 31, researchers Harsh Jaiswal and the Hacktron AI team used AI-enabled variant analysis (searching for the same class of arithmetic evaluation bug across other codebases) and found CVE-2026-1731 in BeyondTrust’s products. BeyondTrust patched SaaS customers on February 2 and published advisory BT26-02 on February 6. Rapid7 reverse-engineered the patch on February 10 by analyzing the modified thin-scc-wrapper script, and published both a detailed write-up and a PoC. win3zz independently published a separate PoC on GitHub the same day. BeyondTrust observed the first exploitation attempt on February 10, and by February 12, watchTowr and Arctic Wolf confirmed mass exploitation was underway. That’s under two weeks from pattern identification to exploitation at scale. This is a concrete example of how AI-assisted vulnerability research compresses the timeline: a pattern discovered in one vendor’s product was applied to a completely different vendor’s product within 24 hours.

Third, this is the fourth significant security issue in or closely related to BeyondTrust’s remote access products in just 14 months, and the second to hit the exact same /nw WebSocket endpoint. The earlier CVE-2024-12356 was the zero-day exploited by a nation-state actor in December 2024; CVE-2026-1731 is a variant in a different code path within the same endpoint. This pattern, where the initial patch addresses the specific exploitation vector but doesn’t fully remediate the broader vulnerability class in the surrounding code, is a recurring theme in security and one worth watching. Organizations that deploy BeyondTrust in internet-facing configurations should factor this track record into their risk models and network segmentation decisions.

Related CVEDateCVSSTypeExploited?
CVE-2024-12356Dec 20249.8Command Injection (/nw endpoint)Yes, Silk Typhoon zero-day; high-profile federal agency breach
CVE-2024-12686Dec 2024MediumDiscovered during subsequent investigationYes, 17 SaaS instances compromised via stolen API key
CVE-2025-1094Jan 2025CriticalPostgreSQL SQL injection (not a BeyondTrust CVE, chained with 12356)Yes, part of the same nation-state breach chain
CVE-2026-1731Feb 20269.9OS Command Injection (/nw endpoint, new code path)Yes, active mass exploitation

Remediation

Primary Action

Patch now. Apply BT26-02 or upgrade to the fixed versions (RS 25.3.2+ / PRA 25.1.1+). This is not a “schedule for your next maintenance window” situation. CISA added this to the KEV catalog on February 13 with a short remediation deadline under BOD 22-01 (Binding Operational Directive, the federal mandate that requires agencies to remediate KEV-listed vulnerabilities by a set due date), and exploitation is already active.

Version-Specific Instructions

Deployment TypeAction
SaaS / Cloud-hostedNo action needed, automatically patched February 2, 2026.
Self-hosted (RS 21.3 – 25.3.1)Apply patch BT26-02-RS or upgrade to RS 25.3.2+.
Self-hosted (PRA 22.1 – 24.3.4)Apply patch BT26-02-PRA or upgrade to PRA 25.1.1+.
Self-hosted (PRA 25.1+)Not affected. No action needed.
Self-hosted (RS < 21.3 / PRA < 22.1)Upgrade to a supported version first, then apply BT26-02. These legacy versions cannot receive the patch directly but are still vulnerable.

Interim Mitigations

If patching cannot happen immediately:

  • Restrict network access to the appliance’s web portal using IP allowlists, VPN, or geoblocking. This reduces the attack surface to trusted networks, but note that it may disrupt legitimate remote support workflows depending on your deployment model.
  • Block or monitor WebSocket connections to the /nw endpoint at the WAF or reverse proxy level. This is a more targeted mitigation but may break client connectivity for legitimate BeyondTrust sessions.
  • Take the portal offline temporarily if neither patching nor access restriction is feasible. This is disruptive but eliminates the attack vector entirely.

Post-Compromise Considerations

Given confirmed active exploitation, any organization that had an internet-facing, unpatched BeyondTrust RS or PRA instance prior to applying BT26-02 should assume potential compromise and investigate. BeyondTrust confirmed exploitation attempts began on February 10, 2026, but earlier probing cannot be ruled out. BeyondTrust advises affected customers to open a Severity 1 support ticket citing “BT26-02.” Specific indicators to hunt for:

  • Persistence: SimpleHelp RMM binaries (potentially renamed) in C:\ProgramData\ directories, launched via Bomgar or SYSTEM processes.
  • Account creation: New domain accounts created via net user /add /domain, especially accounts added to Enterprise Admins or Domain Admins via net group.
  • Discovery: Active Directory enumeration using AdsiSearcher or similar LDAP query tools.
  • Lateral movement: PSExec or Impacket SMBv2 sessions across the network.
  • Credential theft: Unusual access to the PRA credential vault, export of stored credentials, or session recording archives.

Detection Guidance

Network-level indicators

  • HTTP GET requests to /get_portal_info followed shortly by WebSocket upgrade requests to /nw from the same source IP. This is the exploitation sequence.
  • WebSocket traffic to /nw on non-standard ports (not just 443). Attackers are actively scanning alternate ports.
  • Outbound connections to OAST (Out-of-Band Application Security Testing) domains. Darktrace observed these as early indicators of exploitation attempts.
  • Connections from unusual ASNs (Autonomous System Numbers, identifiers for networks operated by specific organizations or ISPs) or commercial VPN exit nodes targeting your BeyondTrust appliance.

Host-Level Indicators

  • Unexpected child processes spawned by BeyondTrust’s service account (the “site user”), particularly curl, wget, bash, or sh.
  • New or renamed binaries in C:\ProgramData\ or Linux equivalent directories, especially anything associated with SimpleHelp RMM.
  • net user and net group commands executed in the context of BeyondTrust processes.
  • Modifications to thin-scc-wrapper or related thin* binaries outside of a known patching window.

How Can Orca Help?

The Orca Cloud Security Platform enables security teams to respond to threats like CVE-2026-1731 within minutes.

  • Instant Discovery: Identify assets running vulnerable BeyondTrust RS and PRA versions across their cloud environments
  • Context-Aware Prioritization: See which vulnerable assets are internet-facing, in production, or contain sensitive data – focus on what matters first
  • Attack Path Analysis: Understand if this vulnerability creates a path to critical assets or can be chained with other risks

Using Orca’s News Item, view highlights affected assets directly, helping security teams cut through the noise and focus on the instances that matter most.