Vulnerabilities in BeyondTrust’s Remote Support Platform

January 28th, 2025

Olatunji Osunji

Introduction

BeyondTrust’s Remote Support platform is a widely used tool for secure remote access and support. Despite its robust security features, vulnerabilities have been discovered that can expose organizations to significant risks if not properly addressed. Here, we discuss the identified vulnerabilities, exploitation methods, protection strategies, threat-hunting approaches, and advice from the cybersecurity community.

What It Is

BeyondTrust’s Remote Support platform facilitates remote assistance by enabling IT teams to securely access and manage devices. It is commonly used in enterprises to troubleshoot and resolve technical issues. However, recent vulnerabilities, such as command injection flaws, have highlighted potential risks associated with the platform.

How It Has Been Exploited

Attackers have exploited vulnerabilities in BeyondTrust’s Remote Support platform to execute arbitrary commands, gain unauthorized access, and exfiltrate sensitive data. Notably:

What Do You Need to Protect Yourself?

To protect against these vulnerabilities, organizations should:

How Can You Hunt to Check if You Are Exposed?

To determine if your organization is exposed to vulnerabilities in BeyondTrust’s Remote Support platform:

Advice from the Cybersecurity Community

The cybersecurity community has emphasized the following measures:

Summary of Recommendations

Action Details
Apply Patches Install the latest updates provided by BeyondTrust for all supported versions.
Monitor Logs Analyze access and authentication logs for unusual patterns.
Conduct Audits Perform regular security audits to identify and remediate vulnerabilities.
Use Threat Feeds Leverage threat intelligence feeds to identify IoCs for CVE-2024-12356.

References