Impact
BeyondTrust Remote Support (RS) and older editions of Privileged Remote Access (PRA) are vulnerable to a pre‑authentication remote code execution flaw. Attackers can send crafted network requests to the service, causing it to run arbitrary operating system commands under the site user’s context. This ability enables full compromise of the affected host, with confidentiality, integrity, and availability all at risk.
Affected Systems
The vulnerability affects BeyondTrust Remote Support and Privileged Remote Access. All installations of BeyondTrust RS and earlier releases of PRA that are not already patched are susceptible. Exact version ranges are not specified in the data, so any unpatched deployment should be considered at risk.
Risk and Exploitability
The CVSS score of 9.9 indicates critical severity, while the EPSS score of 80% indicates a very high likelihood of exploitation. The CVE is listed in CISA’s KEV catalog, confirming that it is actively exploited in the wild. The attack vector is remote, with no authentication required, allowing an unauthenticated attacker to trigger the flaw over the network.
OpenCVE Enrichment