BeyondTrust RCE Vulnerability Exploited: Critical 9.9 CVSS Flaw Under Active Attack
BeyondTrust Remote Support is a privileged access management solution used by IT teams and managed service providers to remotely access and troubleshoot systems across their infrastructure. The software handles some of the most sensitive operations in an organization: remote administrative access, credential management, and privileged session monitoring. This makes it a high-value target for threat actors seeking initial access or lateral movement within enterprise networks.
Critical Pre-Authentication RCE Disclosed
On February 6th, 2026, BeyondTrust disclosed a pre-authentication remote code execution vulnerability carrying a 9.9 CVSS score. The “pre-authentication” designation is particularly concerning because attackers don’t need valid credentials or any prior access to exploit the flaw. They can achieve remote code execution simply by sending specially crafted requests to an exposed BeyondTrust instance, effectively gaining a foothold into the organization’s privileged access infrastructure. All cloud-hosted Remote Support customers were automatically patched on February 2nd, four days before the public disclosure. However, customers with on-premises deployments of BeyondTrust must manually patch the software to remediate the vulnerability.
Active Exploitation Following PoC Release
Less than a week after the disclosure, a public Proof-of-Concept (PoC) was published on GitHub and within a day SOCs began reporting active exploitation attempts. If your organization has an on-premises deployment that is not patched, it should be assumed to be compromised. No additional information has been disclosed about post-exploitation activity or targets.
The Importance of Proactive Monitoring
Beyond the immediate remediation, this incident highlights why proactive monitoring has become non-negotiable. Security teams should be actively monitoring for exploitation attempts against any internet-facing services, especially in the critical 48-72 hour window following a major vulnerability disclosure. Network traffic analysis, behavioral monitoring of remote support sessions, and threat intelligence feeds can provide early warning of compromise attempts before attackers establish persistence.
AI-Accelerated Exploit Development
The timeline of this incident reflects a broader shift in the threat landscape. The window between vulnerability disclosure and active exploitation is shrinking, largely due to AI-powered tools that can rapidly generate working exploit code from technical advisories. What once required skilled reverse engineering and days of development can now be accomplished in hours with large language models analyzing CVE descriptions and patch diffs. Organizations must adapt their security strategies to account for this compressed timeline, assuming that any critical vulnerability disclosure will be followed by working exploits and active scanning shortly thereafter.