Executive Summary
In April 2026, a critical remote code execution vulnerability (CVE-2026-1731) in BeyondTrust's Remote Support (formerly Bomgar) was actively exploited by threat actors. This flaw allowed unauthenticated attackers to execute arbitrary operating system commands, leading to system compromises. Notably, on April 3, a dental software company was breached, affecting three downstream companies. On April 15, an attack on a managed service provider resulted in the isolation of 78 businesses and exploitation across four downstream customers. These incidents underscore the rapid propagation potential of such vulnerabilities within supply chains.
The exploitation of CVE-2026-1731 highlights the increasing trend of attackers targeting remote monitoring and management tools to gain unauthorized access. This method facilitates swift lateral movement across interconnected networks, amplifying the impact on supply chains. Organizations must prioritize patching known vulnerabilities and monitor for unauthorized activities to mitigate such risks.
Why This Matters Now
The active exploitation of CVE-2026-1731 in BeyondTrust's Remote Support underscores the urgent need for organizations to patch known vulnerabilities promptly. The rapid spread of attacks through supply chains highlights the critical importance of securing remote access tools to prevent widespread compromises.
Attack Path Analysis
Attackers exploited a critical pre-authentication remote code execution vulnerability (CVE-2026-1731) in BeyondTrust Remote Support and Privileged Remote Access products, allowing them to execute arbitrary operating system commands without authentication. They escalated privileges by deploying additional remote monitoring and management (RMM) tools such as AnyDesk and Atera, enabling persistent administrative access. Utilizing these tools, attackers moved laterally within the network, compromising domain controllers and other critical systems. Established command and control channels facilitated ongoing control and data exfiltration. Sensitive data was exfiltrated to attacker-controlled servers. The attack culminated in the deployment of LockBit ransomware, encrypting data and disrupting business operations.
Kill Chain Progression
Initial Compromise
Description
Attackers exploited CVE-2026-1731, a pre-authentication remote code execution vulnerability in BeyondTrust Remote Support and Privileged Remote Access products, to execute arbitrary operating system commands without authentication.
Related CVEs
CVE-2026-1731
CVSS 9.8A critical pre-authentication remote code execution vulnerability in BeyondTrust Remote Support and certain versions of Privileged Remote Access allows unauthenticated attackers to execute operating system commands remotely.
Affected Products:
BeyondTrust Remote Support – < 25.3.2
BeyondTrust Privileged Remote Access – < 25.1
Exploit Status:
exploited in the wild
MITRE ATT&CK® Techniques
Exploit Public-Facing Application
Command and Scripting Interpreter
Exploitation of Remote Services
Exploitation for Privilege Escalation
Remote Access Software
Obtain Capabilities: Vulnerabilities
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Ensure all system components and software are protected from known vulnerabilities
Control ID: 6.2
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA – ICT Risk Management Framework
Control ID: Article 5
CISA ZTMM 2.0 – Device Security
Control ID: Pillar 3: Devices
NIS2 Directive – Cybersecurity Risk Management Measures
Control ID: Article 21
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Information Technology/IT
Critical RMM supply chain attacks exploit CVE-2026-1731 enabling mass compromise of IT providers' client networks through Bomgar exploitation and ransomware deployment.
Health Care / Life Sciences
Dental software company compromise demonstrates healthcare vulnerability to RMM supply chain attacks, threatening HIPAA compliance and patient data security.
Financial Services
Supply chain RMM exploitation threatens financial institutions through MSP compromise, enabling lateral movement and potential regulatory compliance violations across banking networks.
Computer Software/Engineering
Software vendors face heightened supply chain risk as RMM exploitation provides attackers access to hundreds of downstream client organizations simultaneously.
Sources
- Surge in Bomgar RMM Exploitation Demonstrates Supply Chain Riskhttps://www.darkreading.com/cyberattacks-data-breaches/surge-bomgar-rmm-exploitation-demonstrates-supply-chain-riskVerified
- BeyondTrust Security Advisory BT26-02https://www.beyondtrust.com/trust-center/security-advisories/bt26-02Verified
- CISA Known Exploited Vulnerabilities Catalog Entry for CVE-2026-1731https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-1731Verified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Aviatrix Zero Trust CNSF is pertinent to this incident as it embeds security directly into the cloud fabric, potentially limiting attackers' ability to move laterally and exfiltrate data.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: The CNSF may have constrained the attacker's ability to exploit the vulnerability by enforcing strict access controls and monitoring, thereby reducing the likelihood of unauthorized command execution.
Control: Zero Trust Segmentation
Mitigation: Zero Trust Segmentation would likely have restricted the attacker's ability to escalate privileges by enforcing least-privilege access and segmenting network resources.
Control: East-West Traffic Security
Mitigation: East-West Traffic Security would likely have constrained lateral movement by monitoring and controlling internal traffic, thereby reducing the attacker's ability to compromise additional systems.
Control: Multicloud Visibility & Control
Mitigation: Multicloud Visibility & Control would likely have limited the establishment of command and control channels by providing comprehensive monitoring and control over network communications.
Control: Egress Security & Policy Enforcement
Mitigation: Egress Security & Policy Enforcement would likely have restricted data exfiltration by monitoring and controlling outbound traffic, thereby reducing the risk of data loss.
While prior controls may have limited the attacker's progression, the deployment of ransomware could still impact systems, but the overall damage would likely be reduced due to constrained access and movement.
Impact at a Glance
Affected Business Functions
- Remote Support Services
- Managed IT Services
- Customer Support Operations
Estimated downtime: 14 days
Estimated loss: $500,000
Potential exposure of sensitive customer data and internal operational information.
Recommended Actions
Key Takeaways & Next Steps
- • Implement Zero Trust Segmentation to restrict lateral movement and limit the spread of attacks within the network.
- • Deploy East-West Traffic Security controls to monitor and control internal traffic, detecting unauthorized movements.
- • Utilize Multicloud Visibility & Control solutions to gain comprehensive insights into network activities across cloud environments.
- • Enforce Egress Security & Policy Enforcement to prevent unauthorized data exfiltration and access to malicious external destinations.
- • Establish Threat Detection & Anomaly Response mechanisms to identify and respond to suspicious activities promptly.



