Feds told to patch BeyondTrust flaw within 3 days after active exploitation

1 min read
Source: BleepingComputer
Feds told to patch BeyondTrust flaw within 3 days after active exploitation
Photo: BleepingComputer
TL;DR Summary

CISA ordered Federal civilian agencies to patch BeyondTrust Remote Support and Privileged Remote Access within three days after CVE-2026-1731, a remote code execution flaw that’s been actively exploited. SaaS instances were patched by BeyondTrust on Feb 2, 2026, but on-premise deployments require manual updates. Exploitation can allow unauthenticated remote code execution, risking system compromise, data exfiltration, and service disruption. Threat intel reports active exploitation and about 11,000 exposed instances (roughly 8,500 on‑premises). The agency added the CVE to its Known Exploited Vulnerabilities catalog and urged mitigations or discontinuation per vendor guidance under BOD 22-01.

Share this article

Reading Insights

Total Reads

1

Unique Readers

1

Time Saved

3 min

vs 4 min read

Condensed

87%

71894 words

Want the full story? Read the original article

Read on BleepingComputer