Wednesday, May 14, 2025
HomeCVE/vulnerabilityCISA Warns of BeyondTrust Privileged Remote Access Exploited in Wild

CISA Warns of BeyondTrust Privileged Remote Access Exploited in Wild

Published on

SIEM as a Service

Follow Us on Google News

 The Cybersecurity and Infrastructure Security Agency (CISA) has sounded the alarm over a critical vulnerability impacting BeyondTrust’s Privileged Remote Access (PRA) and Remote Support (RS) products.

This newly uncovered flaw tracked as CVE-2024-12356, could allow attackers to execute malicious commands, posing a severe risk to global enterprises relying on these tools for secure remote access and IT support.

CVE-2024-12356: Command Injection Vulnerability

The vulnerability under CVE-2024-12356 is a command injection flaw, enabling unauthenticated attackers to inject arbitrary commands that are executed with the permissions of a site user.

- Advertisement - Google News

This type of vulnerability, categorized under CWE-77 (Improper Neutralization of Special Elements used in Commands), stems from poor input validation, leaving systems susceptible to unauthorized access and potentially catastrophic attacks.

Free Webinar on Best Practices for API vulnerability & Penetration Testing:  Free Registration

The precise impact of CVE-2024-12356 is alarming. Attackers exploiting this vulnerability could gain unauthorized control over systems, escalate privileges, and compromise sensitive data.

Although it has not yet been confirmed whether this vulnerability is actively being used in ransomware campaigns, its exploitability and potential for harm highlight the urgency of addressing it.

CISA has urged all organizations using BeyondTrust’s PRA and RS products to act swiftly. The recommended course of action is to apply mitigations or patches as provided by BeyondTrust.

If no mitigation options are available, discontinuing the use of the affected products is strongly advised to avoid potential exploitation.

The deadline for implementing these measures has been set for December 27, 2024, reflecting the critical nature of this vulnerability. As of now, BeyondTrust has not released detailed remediation instructions, but it is expected to provide updates soon.

With privileged access tools being a frequent target of cyberattacks, this vulnerability underscores a pressing need for proactive measures to secure essential systems.

Organizations must stay alert to updates from both BeyondTrust and CISA to prevent potential exploitation. This discovery once again highlights the importance of routine security audits and rapid vulnerability management to counter evolving cyber threats.

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Microsoft Patch Tuesday May 2025 Released With the Fixes for 72 Flaws With 5 Actively Exploited 0-Day

Microsoft has released its May 2025 Patch Tuesday updates, addressing 72 security vulnerabilities across...

Ivanti Released Security Updates to Fix for the Mutiple RCE Vulnerabilities – Patch Now

Ivanti, a leading enterprise software provider, has released critical security updates addressing vulnerabilities across...

Fortinet FortiVoice Zero-day Vulnerability Actively Exploited in The Wild

A critical stack-based buffer overflow vulnerability (CWE-121) has been discovered in multiple Fortinet products,...

Ransomware Attacks Surge by 123% Amid Evolving Tactics and Strategies

The 2025 Third-Party Breach Report from Black Kite highlights a staggering 123% surge in...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Microsoft Patch Tuesday May 2025 Released With the Fixes for 72 Flaws With 5 Actively Exploited 0-Day

Microsoft has released its May 2025 Patch Tuesday updates, addressing 72 security vulnerabilities across...

Ivanti Released Security Updates to Fix for the Mutiple RCE Vulnerabilities – Patch Now

Ivanti, a leading enterprise software provider, has released critical security updates addressing vulnerabilities across...

Fortinet FortiVoice Zero-day Vulnerability Actively Exploited in The Wild

A critical stack-based buffer overflow vulnerability (CWE-121) has been discovered in multiple Fortinet products,...