>
Beyondtrust

CVE-2026-1731

actively exploited

BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability. By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user.

9.9
cvss critical
common vulnerability scoring system v3.1. measures intrinsic severity on a 0-10 scale.
epss 0.7555
exploitation prediction scoring system. probability this vulnerability will be exploited in the wild in the next 30 days.
kev yes
cisa known exploited vulnerabilities catalog. confirmed active exploitation.
rdintel-analysisseverity and description assessed by rdintel before official nvd publication.
CVSS 4.0 Common Vulnerability Scoring System v4.0
9.9 / 10
CRITICAL
exploitability
Attack Vector
Network
Attack Vector (AV:N): exploitable remotely over the network — most dangerous. no physical or adjacent access needed.
Attack Complexity
Low
Attack Complexity (AC:L): no special conditions needed. attack can be reliably reproduced.
Attack Requirements
None
Attack Requirements (AT:N): no special deployment or execution conditions needed.
Privileges Required
None
Privileges Required (PR:N): no authentication needed. any anonymous attacker can exploit this.
User Interaction
None
User Interaction (UI:N): no victim action needed. fully exploitable without user interaction.
vulnerable system impact
Vuln Confidentiality
High
Confidentiality (VC:H): total information disclosure. attacker gains access to all data within the component.
Vuln Integrity
High
Integrity (VI:H): complete data modification possible. attacker can modify any data.
Vuln Availability
High
Availability (VA:H): total denial of service. attacker can fully shut down the resource.
subsequent system impact
Sub Confidentiality
Low
Subsequent Confidentiality: impact on data confidentiality of downstream/connected systems. Value: L (Low)
Sub Integrity
High
Subsequent Integrity: impact on data integrity of downstream/connected systems. Value: H (High)
Sub Availability
Low
Subsequent Availability: impact on service availability of downstream/connected systems. Value: L (Low)
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:H/SA:L
exploit detect attrib advisory media timeline
activity density
rdintel assessment
actively exploited. patch immediately.
ransomware in use.
flagged malicious repos detected. do not execute.
detection rules available.
60 threat composite score from 15+ signals including exploitation status, epss probability, detection coverage, and community attention. 0-100 scale.

sign in to view full intelligence

pocs, detection rules, timeline, advisories, and more