Editorial coverage · CVE-2026-1731
BeyondTrust patched the appliance. Now look at the vault.
An unauthenticated OS command injection in BeyondTrust RS/PRA, mass-exploited before public disclosure. The patch closes the bug. It does not rotate the credentials in the vault that ran through the appliance during the exposure window — and the advisory does not say to.
What we say
The bug is the visible part. The credentials are the part that does not patch itself.
CVE-2026-1731 is an unauthenticated OS command injection in a Bash
arithmetic evaluation reached through the WebSocket handshake of RS and
PRA. A crafted remoteVersion parameter, the -lt comparison operator,
the appliance’s site-user account, remote code execution. The fix is a
regex gate confirming the field is a one-or-two-digit number. It works.
It is also the second time in fifteen months that BeyondTrust has shipped a patch for an OS command injection in this WebSocket endpoint family. CVE-2024-12356 was the first. The December 2024 fix closed one code path and did not audit the surrounding pattern. A researcher with AI tooling asked the obvious follow-up — does the same shape exist elsewhere — and the answer was yes. There was a window between the moment that question could be asked and the moment it was answered. There were roughly 16,400 exposed instances when it was.
The advisory tells operators to apply the patch. Apply the patch. The SaaS customers were patched on February 2; the on-prem customers patched on whatever cadence their change board granted, with a public PoC out by February 10 and mass-exploitation confirmed by February 12. For on-prem operators, the question that the advisory does not start is what to do with the contents of the vault.
When a privileged-access broker is the only approved path into production — the channel a vendor uses to reach the billing system, the route a contractor uses to touch the clinical EHR — the appliance does more than relay sessions. It holds the credentials those sessions use. The site user controls active sessions, appliance configuration, and the credential vault. A site-user-level payload reads what the site user can read. During the on-prem exposure window, that is every shared credential, every stored secret, every privileged API key the appliance brokered.
A patched appliance with un-rotated vault contents is the same shape as a patched MDM with un-rotated admin credentials — the door is closed, the key is still in circulation. The operational analog to credential rotation on this product is not one password change. It is regenerate every secret the appliance brokered during the window: shared logins in stored sessions, API keys for the tooling that runs through the broker, service-account passwords on the systems the broker reaches. Many of those are owned by teams that did not know they had a stake in the BeyondTrust outage. Many of those teams have not been told to rotate.
The three-day KEV deadline on this CVE is correct for an unauthenticated mass-exploited RCE on a privileged-access broker. The three-day deadline is for the patch. The vault question is on a different clock and the advisory does not start it. Three months out, with roughly 8,500 on-prem instances exposed at peak, a number of those operators patched and stopped. The auditor’s question in six months will not be “did you patch in February.” It will be “what did you rotate, and when.”
The narrow lesson is product-specific: when a patch lands on a vendor who has already shipped two RCEs in the same endpoint family in the prior fifteen months, the post-patch review is not optional. The wider one is that a privileged-access broker’s blast radius is the sum of every privileged credential it has ever brokered. A CVSS 9.8 score names the appliance. It does not name the vault.
What NVD says
CWE-78 — improper neutralization of special elements used in an OS command. CVSS 3.1 base 9.8, CVSS 4.0 base 9.9. Vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. Unauthenticated RCE reachable on the same port as the web management interface. NVD carries the exploitability and the impact correctly. What the record does not carry forward: that the site-user account the payload runs as is also the account that controls active sessions and the credential vault. The scoring is bounded to the appliance; the consequence is not.
What the vendor says
BeyondTrust published advisory BT26-02 on February 6, naming CVE-2026-1731 as an OS command injection in the WebSocket handshake path shared by Remote Support and Privileged Remote Access. SaaS instances were auto-patched on February 2, four days ahead of public disclosure. On-prem customers were directed to apply packages BT26-02-RS and BT26-02-PRA via the appliance management interface; fixed builds are RS 25.3.2 and PRA 25.1.1. The advisory describes the bug and the remediation. It does not direct operators to rotate the credentials held in the appliance's vault for the window between public PoC and patch application. That step is the operator's call only because the vendor left it that way.
Compliance impact
- PCI DSS
- RS/PRA appliances that broker privileged access into the Cardholder Data Environment are in scope for Requirement 7 (least-privilege access) and Requirement 8 (strong authentication for non-console privileged access). If the appliance was internet-reachable during the exposure window, the assessor's question is not 'did you patch.' It is 'what privileged credentials passed through this appliance between the public PoC and your patch, and which of them were rotated after.'
- HIPAA
- Covered entities and business associates using RS/PRA as the path for contractor or vendor access to ePHI-bearing systems are exposed to Breach Notification Rule analysis. The four-factor risk assessment cannot stop at 'the appliance is patched' — it has to address what the site-user account could have read or modified during the exposure window, which on a privileged-access broker includes every clinical system the broker reaches and every shared credential held in the vault for it.
Sources
- NVD — CVE-2026-1731
- Rapid7 ETR — CVE-2026-1731 BeyondTrust RS/PRA Unauthenticated RCE
- Unit 42 — BeyondTrust CVE-2026-1731 Post-Exploitation Analysis
- CISA Known Exploited Vulnerabilities Catalog
- Arctic Wolf — CVE-2026-1731 OS Command Injection in BeyondTrust RS/PRA
- Censys Advisory — BeyondTrust RS/PRA CVE-2026-1731
Every source on this list has been read by the editorial team. We do not cite something we have not opened.
Deeper read
Coverage in PatchDay Alert
One email, every weekday morning.
You're in. Check your inbox.