Vulnerabilities in BeyondTrust’s Remote Support Platform

January 28th, 2025

Olatunji Osunji

Introduction

BeyondTrust’s Remote Support platform is a widely used tool for secure remote access and support. Despite its robust security features, vulnerabilities have been discovered that can expose organizations to significant risks if not properly addressed. Here, we discuss the identified vulnerabilities, exploitation methods, protection strategies, threat-hunting approaches, and advice from the cybersecurity community.

What It Is

BeyondTrust’s Remote Support platform facilitates remote assistance by enabling IT teams to securely access and manage devices. It is commonly used in enterprises to troubleshoot and resolve technical issues. However, recent vulnerabilities, such as command injection flaws, have highlighted potential risks associated with the platform.

How It Has Been Exploited

Attackers have exploited vulnerabilities in BeyondTrust’s Remote Support platform to execute arbitrary commands, gain unauthorized access, and exfiltrate sensitive data. Notably:

  • A critical command injection vulnerability (CVE-2024-12356) allows attackers to execute OS commands.
  • State-sponsored hackers exploited this vulnerability to breach U.S. Treasury systems.
  • Exploitation requires sending a malicious client request to the platform.

What Do You Need to Protect Yourself?

To protect against these vulnerabilities, organizations should:

  • Apply patches provided by BeyondTrust for all supported versions (22.1.x and higher).
  • Regularly update software to address newly discovered vulnerabilities.
  • Implement robust access controls and monitor for unauthorized activity.
  • Conduct regular security audits to identify potential risks.

How Can You Hunt to Check if You Are Exposed?

To determine if your organization is exposed to vulnerabilities in BeyondTrust’s Remote Support platform:

  • Monitor network traffic for suspicious or unexpected requests to the BeyondTrust platform.
  • Review authentication and access logs for anomalies.
  • Utilize threat intelligence feeds to identify indicators of compromise (IoCs) associated with CVE-2024-12356.
  • Conduct penetration tests to assess your platform’s security posture.

Advice from the Cybersecurity Community

The cybersecurity community has emphasized the following measures:

  • Apply vendor patches immediately.
  • Enable logging and audit trails to monitor for suspicious activity.
  • Educate employees about the importance of timely updates.
  • Follow recommendations from CISA and other authoritative bodies.

Summary of Recommendations

Action Details
Apply Patches Install the latest updates provided by BeyondTrust for all supported versions.
Monitor Logs Analyze access and authentication logs for unusual patterns.
Conduct Audits Perform regular security audits to identify and remediate vulnerabilities.
Use Threat Feeds Leverage threat intelligence feeds to identify IoCs for CVE-2024-12356.

References