Fraud Management & Cybercrime,
Identity & Access Management,
Ransomware
Critical Vulnerability Could Provide Attackers Access to Clinical Networks

U.S. authorities have issued a warning to hospitals and clinics regarding a significant vulnerability in BeyondTrust’s Remote Support and Privileged Remote Access software. This flaw could enable attackers to gain unauthorized access to corporate networks, posing a serious risk to patient data and overall healthcare operations.
The U.S. Department of Health and Human Services alerted healthcare and public health organizations to address this vulnerability amid a surge in cyberattacks targeting the sector. The Cybersecurity and Infrastructure Security Agency has identified this issue as CVE-2026-1731, adding it to their list of known exploited vulnerabilities on February 13. Federal agencies were allotted a mere three days to implement necessary fixes.
Cybersecurity firm Palo Alto Networks’ Unit 42 reported on February 20 that this vulnerability is being actively exploited by cybercriminals. Attackers leverage this flaw to assume unauthorized control over systems, which could facilitate a broad range of malicious actions, from data theft to persistent access to sensitive networks.
BeyondTrust issued a security advisory, cautioning that exploitations of this vulnerability could lead to severe consequences, including unauthorized access, data exfiltration, and service disruption. Patches were released on February 2, with automatic deployments initiated for instances using the update service, as well as applications within SaaS environments.
Healthcare organizations commonly utilize BeyondTrust Remote Support to allow their IT and clinical engineering teams secure access to resolve issues with end-user systems without the need for on-site presence. This tool is an essential aspect of remote support across many healthcare institutions, yet the extent of its use varies significantly, according to Errol Weiss, chief security officer of Health-ISAC.
While Weiss refrained from discussing specific instances of Health-ISAC members falling victim to this vulnerability, he indicated that prior campaigns have demonstrated exploitation of BeyondTrust vulnerabilities. Given the severity of this issue, it is highly plausible that threat actors will attempt to weaponize this particular flaw, especially against systems that remain unpatched or exposed.
The critical nature of the BeyondTrust vulnerability, combined with its potential for remote exploitation and elevated access levels, positions it as an appealing target for ransomware groups. The capability of this software to connect to various internal assets means that compromising it could quickly escalate into widespread incidents that seriously disrupt patient care and organizational integrity.