CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

Search Vulnerabilities

 Software

Searching vulnerabilities affecting “beyondtrust”

31 vulnerabilities found for “beyondtrust”

Page 1 of 2

CVE-2026-1731
CRITICAL9.8

BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability. By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user.

beyondtrust / privileged_remote_access+1
Network
Published Feb 6, 2026
Page 1 of 2
CVE-2025-5309
CRITICAL9.8

The chat feature within Remote Support (RS) and Privileged Remote Access (PRA) is vulnerable to a Server-Side Template Injection vulnerability which can lead to remote code execution.

beyondtrust / privileged_remote_access+5
Network
Published Jun 16, 2025
CVE-2024-12686
MEDIUM6.6

A vulnerability has been discovered in Privileged Remote Access (PRA) and Remote Support (RS) which can allow an attacker with existing administrative privileges to inject commands and run as a site user.

beyondtrust / privileged_remote_access+1
Network
Published Dec 18, 2024
CVE-2024-12356
CRITICAL9.8

A critical vulnerability has been discovered in Privileged Remote Access (PRA) and Remote Support (RS) products which can allow an unauthenticated attacker to inject commands that are run as a site user.

beyondtrust / privileged_remote_access+1
Network
Published Dec 17, 2024
CVE-2024-9110
MEDIUM6.4

A medium severity vulnerability has been identified within Privileged Identity which can allow an attacker to perform reflected cross-site scripting attacks.

beyondtrust / privileged_identity
Network
Published Oct 30, 2024
CVE-2024-5813
MEDIUM5.9

A medium severity vulnerability in BIPS has been identified where an authenticated attacker with high privileges can access the SSH private keys via an information leak in the server response.

beyondtrust / beyondinsight_password_safe
Network
Published Jun 11, 2024
CVE-2024-5812
LOW3.3

A low severity vulnerability in BIPS has been identified where an attacker with high privileges or a compromised high privilege account can overwrite Read-Only smart rules via a specially crafted API request.

beyondtrust / beyondinsight_password_safe+2
Network
Published Jun 11, 2024
CVE-2024-4219
MEDIUM4.8

Prior to 23.2, it is possible to perform arbitrary Server-Side requests via HTTP-based connectors within BeyondInsight, resulting in a server-side request forgery vulnerability.

beyondtrust / beyondinsight
Adjacent
Published Jun 4, 2024
CVE-2024-4220
MEDIUM4.3

Prior to 23.1, an information disclosure vulnerability exists within BeyondInsight which can allow an attacker to enumerate usernames.

beyondtrust / beyondinsight
Adjacent
Published Jun 4, 2024
CVE-2024-4018
HIGH8.8

Improper Privilege Management vulnerability in BeyondTrust U-Series Appliance on Windows, 64 bit (local appliance api modules) allows Privilege Escalation.This issue affects U-Series Appliance: from 3.4 before 4.0.3.

beyondtrust / u-series_appliance
Local
Published Apr 19, 2024
CVE-2024-4017
HIGH8.8

Improper Privilege Management vulnerability in BeyondTrust U-Series Appliance on Windows, 64 bit (filesystem modules) allows DLL Side-Loading.This issue affects U-Series Appliance: from 3.4 before 4.0.3.

beyondtrust / u-series_appliance
Local
Published Apr 19, 2024
CVE-2020-12612
HIGH7.8

An issue was discovered in BeyondTrust Privilege Management for Windows through 5.6. When specifying a program to elevate, it can typically be found within the Program Files (x86) folder and therefore uses the %ProgramFiles(x86)% environment variable. However, when this same policy gets pushed to a 32bit machine, this environment variable does not exist. Therefore, since the standard user can create a user level environment variable, they can repoint this variable to any folder the user has full control of. Then, the folder structure can be created in such a way that a rule matches and arbitrary code runs elevated.

beyondtrust / privilege_management_for_windows+1
Local
Published Dec 12, 2023
CVE-2020-12614
HIGH7.8

An issue was discovered in BeyondTrust Privilege Management for Windows through 5.6. If the publisher criteria is selected, it defines the name of a publisher that must be present in the certificate (and also requires that the certificate is valid). If an Add Admin token is protected by this criteria, it can be leveraged by a malicious actor to achieve Elevation of Privileges from standard user to administrator.

beyondtrust / privilege_management_for_windows
Local
Published Dec 12, 2023
CVE-2020-12615
HIGH7.8

An issue was discovered in BeyondTrust Privilege Management for Windows through 5.6. When adding the Add Admin token to a process, and specifying that it runs at medium integrity with the user owning the process, this security token can be stolen and applied to arbitrary processes.

beyondtrust / privilege_management_for_windows+1
Local
Published Dec 12, 2023
CVE-2021-3187
HIGH8.8

An issue was discovered in BeyondTrust Privilege Management for Mac before 5.7. An authenticated, unprivileged user can elevate privileges by running a malicious script (that executes as root from a temporary directory) during install time. (This applies to macOS before 10.15.5, or Security Update 2020-003 on Mojave and High Sierra, Later versions of macOS are not vulnerable.)

beyondtrust / privilege_management_for_mac
Network
Published Dec 11, 2023
CVE-2020-12613
HIGH8.8

An issue was discovered in BeyondTrust Privilege Management for Windows through 5.6. An attacker can spawn a process with multiple users as part of the security token (prior to Avecto elevation). When Avecto elevates the process, it removes the user who is launching the process, but not the second user. Therefore this second user still retains access and can give permission to the process back to the first user.

beyondtrust / privilege_management_for_windows
Network
Published Dec 11, 2023
CVE-2023-4310
CRITICAL9.8

BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) versions 23.2.1 and 23.2.2 contain a command injection vulnerability which can be exploited through a malicious HTTP request. Successful exploitation of this vulnerability can allow an unauthenticated remote attacker to execute underlying operating system commands within the context of the site user. This issue is fixed in version 23.2.3.

beyondtrust / privileged_remote_access+3
Network
Published Sep 5, 2023
CVE-2021-42254
HIGH7.8

BeyondTrust Privilege Management prior to version 21.6 creates a Temporary File in a Directory with Insecure Permissions.

beyondtrust / privilege_management_for_windows
Local
Published Nov 19, 2021
CVE-2021-3156
HIGH7.8

Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.

sudo_project / sudo+31
Local
Published Jan 26, 2021
CVE-2018-10959
HIGH7.5

Avecto Defendpoint 4 prior to 4.4 SR6 and 5 prior to 5.1 SR1 has an Untrusted Search Path vulnerability, exploitable by modifying environment variables to trigger automatic elevation of an attacker's process launch.

beyondtrust / avecto_defendpoint+1
Network
Published Apr 17, 2019