Canadian Cyber Security Journal
SOCIAL:
Filed under: Featured, TechTalk

BeyondTrust CVE-2026-1731: CVSS 9.9 Remote Access Flaw Now Exploited in Ransomware Attacks Against Canadian Organizations — What Security Teams Must Do Now

What Happened

CISA updated its Known Exploited Vulnerabilities catalog entry for CVE-2026-1731 to flag active exploitation in ransomware campaigns. The vulnerability carries a CVSS score of 9.9 and affects BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) — two widely deployed remote access and privileged session management platforms used across enterprise and government environments.

The flaw is a pre-authentication OS command injection weakness. Attackers send specially crafted requests to execute arbitrary operating system commands as the site user without providing any credentials. Exploitation began within 24 hours of a public proof-of-concept release on February 10, 2026. In addition to ransomware deployment, attackers have used the vulnerability to install web shells, backdoors, VShell, and SparkRAT, and to conduct data exfiltration before encrypting systems.

Targeted sectors confirmed in active campaigns include financial services, healthcare, higher education, legal services, high-technology, and retail. Affected countries include the United States, Canada, Australia, Germany, and France.

Why This Matters for Canadian Organizations

Canada’s direct inclusion in the confirmed victim set makes this an immediate national incident response concern, not a watch-and-wait situation. The Canadian Centre for Cyber Security issued advisory AL26-003 specifically for CVE-2026-1731, signalling the Cyber Centre’s own assessment of its severity to Canadian operators.

BeyondTrust Remote Support and Privileged Remote Access are standard tools across Canadian financial institutions, managed service providers, hospitals, and federal and provincial government departments. These platforms sit at the intersection of privileged access and remote connectivity — two of the highest-value targets in any ransomware precursor operation. A compromised BeyondTrust instance gives attackers authenticated, elevated access to the systems and accounts managed through it.

Organizations subject to OSFI Guideline B-13 face mandatory third-party risk assessments when vendors of this type are breached or their software is exploited at scale. PIPEDA breach notification obligations are triggered if personal information is accessed during the intrusion. Given the confirmed ransomware use, data exfiltration prior to encryption is a documented attack pattern — not a theoretical one.

What to Do

Patch immediately. BeyondTrust Remote Support 25.3.2 and Privileged Remote Access 24.3.5 address CVE-2026-1731. If patching is not possible within 24 hours, take BeyondTrust instances offline or restrict access to trusted IP ranges only until the update is applied.

Audit your BeyondTrust logs from February 10 onward for anomalous session activity, unexpected process execution, and outbound connections to unfamiliar hosts. Run threat hunting queries for VShell and SparkRAT indicators of compromise published by Palo Alto Unit 42.

Rotate all credentials stored in or accessible through BeyondTrust, including service account passwords, SSH keys, and privileged account credentials. Contact the CCCS at cyber.gc.ca to report suspected compromise. Review the full CCCS advisory at AL26-003.

Source: SecurityWeek

Enjoy this article? Don’t forget to share.