Latest
Vulnerabilities

Active Attacks Exploit Critical BeyondTrust RS Vulnerability

Active Attacks Exploit Critical BeyondTrust RS Vulnerability

Researchers are sounding the alarm about a serious vulnerability that was patched this week in BeyondTrust Remote Support. This flaw is reportedly being actively exploited in the wild, targeting self-hosted deployments, including Bomgar remote support appliances that utilize affected software versions.

Bomgar, known for its privileged identity and access management products, acquired BeyondTrust in 2018 and adopted its brand name. The Bomgar on-premises hardware appliances, branded as BeyondTrust B-series appliances, offer secure remote access to enterprise networks. However, many of these hardware models have reached end of life, prompting customers to upgrade to either virtual appliances or BeyondTrust’s Software as a Service (SaaS) offerings: Privileged Remote Access (Cloud) and Remote Support (Cloud).

Researchers from Arctic Wolf have reported attacks that compromised Bomgar appliances through the CVE-2026-1731 vulnerability that was patched this week. The attackers aimed to deploy the SimpleHelp remote management and monitoring tool and carried out lateral movements to other systems within the network.

Details of the Exploitation

The researchers noted that “renamed SimpleHelp binaries were created through Bomgar processes using the SYSTEM account.” These executables were saved in the ProgramData root directory and executed from there. Names of the binaries included remote access.exe among others.

Additionally, the attackers were able to create domain accounts by using the net user command, subsequently adding these accounts to administrative groups such as “enterprise admins” and “domain admins.”

To further their infiltration, the attackers employed the AdsiSearcher tool to probe the Active Directory for other computers and used PSexec to install SimpleHelp on multiple devices.

Vulnerability Overview

The researchers also identified Impacket SMBv2 session setup requests in the compromised environments. Impacket is a Python library commonly used to decode network traffic, often in tandem with sniffing tools.

CVE-2026-1731 is classified as a critical pre-authentication command injection vulnerability affecting BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA). Although the company has released patches for various versions of the affected software, applying these patches requires that older versions of RS be updated first, which may pose challenges for appliances that are no longer supported and have reached end of life.

A proof-of-concept exploit was made available on GitHub, which likely accelerated the subsequent attacks. As a remote access solution, BeyondTrust RS presents an appealing target for state-sponsored attackers and ransomware groups. Notably, the US Department of the Treasury experienced compromises to some of its workstations after hackers exploited vulnerabilities in its SaaS instances of BeyondTrust RS.

More in Vulnerabilities & Patches

30-Year-Old Vulnerability Discovered in libpng Library
Vulnerabilities

30-Year-Old Vulnerability Discovered in libpng Library

Apr 16, 2026 3 min read
Microsoft Addresses Exploited SharePoint Vulnerability and Fixes 160 Additional Security Flaws
Vulnerabilities

Microsoft Addresses Exploited SharePoint Vulnerability and Fixes 160 Additional Security Flaws

Apr 16, 2026 2 min read
10 Persistent Software Bugs That Took Ages to Fix
Vulnerabilities

10 Persistent Software Bugs That Took Ages to Fix

Apr 15, 2026 9 min read
Vulnerability may allow hackers to seize control of Juniper Networks PTX core routers
Vulnerabilities

Vulnerability may allow hackers to seize control of Juniper Networks PTX core routers

Apr 14, 2026 3 min read