Recent from talks
Nothing was collected or created yet.
BeyondTrust
View on WikipediaBeyondTrust (formerly Symark) is an American company that develops, markets, and supports a family of privileged identity management / access management (PIM/PAM), privileged remote access, and vulnerability management products for UNIX, Linux, Windows and macOS operating systems.
Key Information
BeyondTrust was founded in 2006 and provided Least Privilege Management software for the Microsoft Windows OS, before UNIX vendor Symark acquired BeyondTrust in 2009.[1][2] In 2018, the company was acquired by Bomgar, a developer of remote support and PAM software.[3] In both cases, BeyondTrust was adopted as the new company name.[4][5]
History
[edit]Symark
[edit]Symark was founded in 1985 as a VAX/VMS utility software company in Los Angeles' San Fernando Valley. Its name is derived from the initials of its founders, Bob Sommers and Doug Yarrow. Symark was also a client-server computing vendor, before later acquiring a license for the UNIX security product UPM (now owned by Quest Software)[6] and rebranding their version PowerBroker.[7][8] Symark relocated to Westlake Village, California, then again to Agoura Hills.
The company was focused on identity, access, and password management for privileged users on UNIX[9] systems. From 2003—2008 the company expanded in Spain, Portugal, Japan and Latin America. During the same time period, they also grew by almost 300 percent and were one of the fastest growing private companies in the Los Angeles area.
The original BeyondTrust
[edit]In 2003, AutoProf introduced the AutoProf Policy maker, which was the first commercial product[10] to build upon Microsoft's built-in Group Policy Objects to make common tasks like mapping network drives or sharing printer connections easier. In 2005, AutoProf grew 90% in revenue over the previous year[11] and changed the company name to DesktopStandard.[12] Four million desktops were under the management of DesktopStandard's software across 3,500 customers. From 2003 to 2005, DesktopStandard added six products to their portfolio for role-based access control (RBAC), password management, and identity access management on Windows. In 2006, Microsoft acquired most of DesktopStandard's products, and DesktopStandard's CEO formed a new company (BeyondTrust) around the remaining Policy Maker Application Security product.[13]
Acquisitions
[edit]2009: Symark acquired the Windows-based business of BeyondTrust in 2009 for approximately $20 million[14] and they adopted BeyondTrust as the new company name.[15]
2011: BeyondTrust acquired software from Likewise Software.[16]
May 2012: BeyondTrust acquired Vulnerability Management Pioneer eEye Digital Security.[17]
December 2012: BeyondTrust acquired Blackbird Group.[18]
September 2014: Veritas Capital acquired BeyondTrust for $310 million.[19]
October 2018: Bomgar acquired BeyondTrust from Veritas.[20]
Bomgar
[edit]| Bomgar | |
|---|---|
![]() | |
| Developers | BeyondTrust Software, Inc. |
| Initial release | 2003[21] |
| Operating system | Android, BlackBerry, iOS, Linux, OS X, Windows, Windows Mobile[22] |
| Type | Remote administration |
| License | Proprietary |
| Website | www |
Bomgar was a remote support provider that allows support technicians to remotely connect to end-user systems through firewalls from their computer or mobile device. Using the Bomgar Representative Console, technology support professionals can access and control systems and devices remotely, including personal computers, smartphones, tablets, servers, switches, point-of-sale systems and others.[23]
The company originated when Joel Bomgaars developed his own remote support solutions to cut back on wasted hours he spent travelling while working as a support professional for a local company. In June 2003, he set up a one-page, static website selling his own, home-grown remote access solution, calling it ExpertVNC. Soon thereafter, his two college friends, Nathan McNeill and Patrick Norman, joined Bomgar as co-founders.[24]
In May 2004, ExpertVNC changed its name to NetworkStreaming. In the next month it changed its cloud-based product to an appliance model, differentiating itself from other similar remote support solutions.
In February 2007, NetworkStreaming changes its company name to Bomgar, a simplified form of Joel Bomgaars' family name that he also chose to use professionally for himself.[25][26][27]
Bomgar's first private equity investors, TA Associates, placed a majority investment in Bomgar in May 2014.[28]
In April 2018, Francisco Partners announced that it acquired Bomgar from Thoma Bravo,[29] which owned Bomgar since June 2016.[30] Financial details of this deal were not disclosed.
Bomgar now operates under the name BeyondTrust.[31][32]
Treasury Department hacking incident
[edit]It was reported on December 30, 2024 that BeyondTrust was implicated in a hacking incident against the U.S. Treasury Department by state-sponsored Chinese hackers.[33] According to the report, the hackers stole an API key for a remote support SaaS application from BeyondTrust and used it to compromise U.S. Treasury workstations, viewing unclassified documents in what was described as a "major incident".[34][35]
See also
[edit]References
[edit]- ^ By Steve Ragan, The Tech Herald. "Symark and BeyondTrust – best acquisition ever. September 14, 2009."
- ^ By Doug Barney, Redmond Magazine. "Desktop Standard Bought by Microsoft -- Mostly Archived 2011-04-11 at the Wayback Machine. " October 3, 2006. Retrieved on August 28, 2009.
- ^ By Andrew Ross, InformationAge. "Bomgar completes acquisition of BeyondTrust Archived 2018-10-04 at the Wayback Machine. " October 4, 2018.
- ^ By Sean Michael Kerner, eWeek. "Bomgar to Be Renamed BeyondTrust After Acquisition of PAM Vendor Archived 2023-09-11 at the Wayback Machine. " September 13, 2018.
- ^ By Tim Wilson, Dark Reading. "Symark Buys BeyondTrust, Takes BeyondTrust Name Archived 2015-09-23 at the Wayback Machine. " September 14, 2009.
- ^ "PassGo Will Bring Quest Greater Multiplatform Capabilities". www.gartner.com. Archived from the original on 2017-12-22. Retrieved 2017-12-19.
- ^ Jeff, Parker (22 August 2017). "BeyondTrust PowerBroker Active Directory Tools for PCI/SOX/HIPAA Compliance". ITTSystems.com. Archived from the original on 24 August 2017. Retrieved 23 August 2017.
- ^ By Alex Woodie, The Linux Beacon. "Symark Tackles Tough Access Control Problems Archived January 9, 2009, at the Wayback Machine. " April 2, 2008.
- ^ "Unix Privileged Identity & Access Management". 2016. Archived from the original on 2016-04-01. Retrieved 2016-06-29.
- ^ Tulloch, Mitch. "Windows Server Hacks: AutoProf Policy Maker". WindowsDevCenter. O'Reilly. Archived from the original on 19 July 2017. Retrieved 31 January 2018.
- ^ Press Release. "AutoProf Announces Record Year Revenue Growth. " January 12, 2005. Retrieved on August 28, 2009
- ^ Press Release. "Article: AutoProf Announces Name Change and Releases Group Policy Security Product; DesktopStandard Corporation Provides Application-Level Security Product to Satisfy Regulatory Compliance Needs. " January 26, 2005. Retrieved on August 28, 2009.
- ^ Montalbano, Elizabeth (2006-10-02). "Microsoft buys DesktopStandard". InfoWorld. Archived from the original on 2019-08-17. Retrieved 2019-08-17.
- ^ "BeyondTrust | ITworld". Archived from the original on 2011-06-07. Retrieved 2010-01-07.
- ^ By Jackie Noblett, Mass High Tech. "BeyondTrust acquired by Symark Archived 2009-09-22 at the Wayback Machine. September 14, 2009
- ^ "BeyondTrust Acquires Assets Of Likewise Software To Expand Access Management Business". www.networkcomputing.com. Archived from the original on 2024-07-05. Retrieved 2024-07-05.
- ^ "BeyondTrust Acquires Vulnerability Management Pioneer eEye Digital Security | Reuters". Reuters. Archived from the original on 2013-06-30. Retrieved 2017-06-30.
- ^ Peacock, Marisa (12 December 2012). "BeyondTrust Acquires BlackBird Group, Improves Enterprise Security". CMSWire. Retrieved 5 July 2024.
- ^ Osborne, Charlie (3 September 2014). "Veritas Capital snaps up security firm BeyondTrust for $310 million". ZDNet. Archived from the original on 25 September 2019. Retrieved 5 October 2018.
- ^ "Bomgar to be Renamed BeyondTrust After Acquisition of PAM Vendor". 13 September 2018.
- ^ "FAQs". Bomgar. Archived from the original on 2010-05-16. Retrieved 2010-07-03.
- ^ "Bomgar Unveils FIPS-Compliant Remote Access Helpdesk Tool". darkReading. June 21, 2010. Archived from the original on 2010-06-28. Retrieved 2010-07-03.
- ^ Ohlhotst, Frank (January 13, 2009). "Bomgar Offer an Appliance for All Remote Support Needs". ChannelInsider. Retrieved 2010-07-03.
- ^ "BeyondTrust". Privco. Archived from the original on March 25, 2019. Retrieved March 25, 2019.
- ^ McNamara, Paul. "Company's new name has familiar ring". Network World. Archived from the original on 2013-10-29. Retrieved 2017-04-04.
- ^ Fenn, Donna (August 16, 2010). "Is There a Memorable Brand Hidden in Your Name?". CBS News. Archived from the original on September 27, 2021. Retrieved September 27, 2021.
- ^ Blakely, Lindsay (December 23, 2010). "A New Brand Name Changed Everything". CBS News. Archived from the original on September 27, 2021. Retrieved September 27, 2021.
- ^ "News | TA". TA Associates. Archived from the original on 2018-04-17. Retrieved 2018-04-17.
- ^ "Francisco Partners Acquires Bomgar | BOMGAR". www.bomgar.com. Archived from the original on 2018-04-17. Retrieved 2018-04-17.
- ^ "Thoma Bravo Acquires Bomgar, Strengthens Security Software Portfolio | BOMGAR". www.bomgar.com. Archived from the original on 2018-04-17. Retrieved 2018-04-17.
- ^ "Bomgar Is Now BeyondTrust". Archived from the original on 2019-10-03. Retrieved 2019-10-03.
- ^ Kerner, Sean (2018-09-13). "Bomgar to Be Renamed BeyondTrust After Acquisition of PAM Vendor". eWeek. Archived from the original on 2023-09-11. Retrieved 2019-04-19.
- ^ "Treasury says Chinese hackers remotely accessed workstations, documents in 'major' cyber incident". Associated Press. 2024-12-30. Archived from the original on 2024-12-30. Retrieved 2024-12-31.
- ^ "What to know about string of US hacks blamed on China". www.bbc.com. Retrieved 2025-01-03.
- ^ Shapero, Julia (2024-12-30). "Chinese hackers breached Treasury Department, agency says". The Hill. Retrieved 2024-12-30.
External links
[edit]BeyondTrust
View on GrokipediaBeyondTrust is an American cybersecurity company specializing in privileged access management (PAM) and identity security solutions that secure privileged credentials, monitor sessions, and control access to prevent abuse and mitigate breach risks.[1][2]
Tracing its origins to Symark, founded in 1985, the company rebranded as BeyondTrust following a 2009 acquisition and further consolidated its portfolio in 2018 when Bomgar acquired it and adopted the BeyondTrust name, integrating remote support capabilities with PAM tools.[3][4]
BeyondTrust's platform emphasizes an identity-centric approach to visibility, threat remediation, and dynamic access controls across on-premises, cloud, and hybrid environments, serving enterprises in sectors requiring high-security compliance.[5][1]
Key products include endpoint privilege management, secure remote access, and password safe solutions, with recent expansions via the 2024 acquisition of Entitle to incorporate just-in-time access for cloud permissions.[6]
The firm has achieved record revenue growth, particularly in SaaS offerings, and is positioned as a leader in protecting "paths to privilege" amid rising cyber threats from compromised credentials.[7][8]
History
Founding of Original BeyondTrust
BeyondTrust originated as a spinoff from DesktopStandard Corporation following Microsoft's acquisition of the latter's core policy management assets in October 2006. DesktopStandard, a provider of Group Policy tools for Windows environments, sold its primary products to Microsoft on October 2, 2006, but excluded its PolicyMaker Application Security software, which enforced least-privilege access on desktops to mitigate risks from administrative rights. This product formed the foundation of BeyondTrust, which was established to commercialize it under the renamed Privilege Manager, targeting enterprise security by preventing unauthorized application executions and reducing privilege escalation vulnerabilities.[9][10] The company was founded in 2006 with approximately 20 employees, many drawn from DesktopStandard's Portsmouth, New Hampshire, operations, and initially operated as a small developer focused exclusively on Windows-based privileged access management. John Moyer, co-founder and CEO of DesktopStandard since 1998, transitioned to lead BeyondTrust as its CEO, leveraging his expertise in desktop security extensions for Active Directory. Other key figures included co-founders Bob Sommers and Doug Yarrow, though the entity's formation emphasized continuity from DesktopStandard's security-focused team rather than a entirely new venture. BeyondTrust's early emphasis was on tools that allowed standard users temporary elevated privileges without full admin rights, addressing a gap in Microsoft's ecosystem post-acquisition.[11][12][13] This founding positioned BeyondTrust as a niche player in endpoint privilege management, predating broader industry adoption of zero-trust principles, with its software integrating directly with Windows to enforce granular controls over application behavior and user permissions. The spinoff ensured independence from Microsoft, allowing BeyondTrust to pursue commercial expansion in the emerging market for least-privilege enforcement amid rising concerns over insider threats and malware exploiting admin rights. By 2009, prior to its acquisition by Symark, BeyondTrust had established a foothold in Windows security, distinguishing it from Unix-focused competitors.[14][3]Acquisition by Symark and Rebranding (2009)
In September 2009, Symark International, a provider of privileged access management solutions primarily for Unix and Linux environments founded in 1985, acquired the Windows-based business unit of BeyondTrust, a smaller developer specializing in Windows privilege management software.[3][15] The transaction, announced on September 14, 2009, was valued at approximately $20 million and marked Symark's initial step in a strategy to consolidate cross-platform technologies for broader enterprise security coverage.[16][17] The acquisition integrated BeyondTrust's PowerBroker for Servers and Desktops products, which focused on least-privilege enforcement in Microsoft Windows settings, with Symark's established Unix-oriented offerings like PowerPassword.[18] This move addressed a key market gap by enabling unified privileged identity management across heterogeneous operating systems, reducing administrative risks from elevated user privileges in mixed environments.[19] Symark's leadership positioned the deal as pragmatic expansion to meet demands for compliant, secure access controls amid growing regulatory pressures like SOX and PCI-DSS.[20] Following the acquisition, the combined entity rebranded to BeyondTrust, reflecting a unified focus on trust beyond traditional boundaries and phasing out the Symark name to streamline market identity.[18][20] The rebranding emphasized cross-platform capabilities, with the new name signaling innovation in preventing insider threats and external exploits through granular access controls, while retaining core technologies from both predecessors.[21] This transition supported product roadmap alignment, including enhanced auditing and session monitoring features deployable across Windows, Unix, and Linux infrastructures.[22]Bomgar Acquisition and Expansion (2018)
On September 13, 2018, Bomgar, a provider of remote support and privileged access management (PAM) solutions owned by Francisco Partners, announced a definitive agreement to acquire BeyondTrust from an affiliate of Veritas Capital.[23] The acquisition aimed to combine Bomgar's remote support capabilities with BeyondTrust's endpoint protection and PAM technologies, forming a more comprehensive platform for securing privileged credentials and access.[24] The deal closed on October 4, 2018, after which the combined entity rebranded under the BeyondTrust name, unifying operations and product lines.[4] This followed Bomgar's earlier 2018 acquisitions of Lieberman Software in February and Avecto in July, which had already expanded its PAM portfolio with credential management and endpoint privilege controls.[25] The integration of these four companies—Bomgar, BeyondTrust, Avecto, and Lieberman Software—positioned the new BeyondTrust as offering the industry's broadest PAM solutions, including remote support, password safe, server security, and least privilege enforcement.[26] The acquisition enhanced BeyondTrust's market reach, with Bomgar's established remote support tools complementing the acquired firm's focus on privileged access controls, enabling customers to address threats from insider risks, stolen credentials, and lateral movement in networks.[27] Post-acquisition, the company emphasized unified platforms to reduce complexity in PAM deployments, supporting scalability for enterprises managing hybrid environments.[4]Post-2018 Growth and Developments
Following the 2018 acquisition and rebranding, BeyondTrust pursued aggressive organic expansion, bolstered by strategic private equity investments. In June 2021, the company secured a significant investment from Clearlake Capital Group, partnering alongside existing backer Francisco Partners, to fuel innovation in privileged access management (PAM) and accelerate growth in the cybersecurity sector.[28] [29] This capital infusion supported enhanced research and development, enabling the company to scale operations and deepen its product integrations for identity security. BeyondTrust reported robust financial metrics in subsequent years, reflecting strong market demand for its PAM solutions. In 2021, annual recurring revenue (ARR) grew by more than 25%, accompanied by expansions in its identity security offerings to address evolving threats like credential misuse.[30] By 2022, recurring revenue constituted 80% of total revenue, with ARR increasing over 25% year-over-year and subscription ARR surging 90% year-over-year, alongside record new customer bookings.[7] Employee headcount expanded from approximately 800 immediately post-acquisition in 2018 to around 1,700 by 2025, underscoring operational scaling to support global customer deployment.[31] [32] Product developments emphasized platform enhancements for broader access controls and threat mitigation. In May 2023, BeyondTrust launched updates to its identity and access security platform, including a streamlined access console for developers and cloud operations engineers, alongside advanced capabilities for just-in-time privilege elevation and session monitoring to reduce insider risks.[33] These iterations integrated with cloud-native environments, positioning the company to capture share in hybrid IT infrastructures amid rising remote work and zero-trust adoption.Products and Services
Privileged Access Management Solutions
BeyondTrust's Privileged Access Management (PAM) solutions form a comprehensive platform aimed at discovering, securing, and governing privileged credentials, sessions, and access rights across on-premises, cloud, and hybrid infrastructures. The suite emphasizes credential vaulting, session monitoring, and least-privilege enforcement to prevent unauthorized access, insider threats, and credential abuse, with capabilities for automated discovery of unmanaged accounts and just-in-time provisioning.[34][35] These tools integrate centralized analytics and reporting to support compliance with standards such as NIST and PCI-DSS, as well as industry-specific frameworks like TISAX in the automotive sector. While BeyondTrust does not hold TISAX certification itself, as it is not listed among their industry certifications (which include ISO, SOC 2, FedRAMP, etc.), their PAM tools help meet relevant information security requirements for TISAX in automotive contexts. For example, Vialto Partners used BeyondTrust to implement strong identity and access controls, enabling them to pass German TISAX certification on their first attempt. Auditors noted the solidity of the controls provided by BeyondTrust.[36][37][38] A core component is Password Safe, which automates the management of privileged passwords, SSH keys, and API tokens through secure vaulting, scheduled rotation, and injection during sessions to eliminate static credential exposure. It includes features for bulk discovery of service accounts across endpoints and databases, with granular access controls via role-based policies and multi-factor authentication (MFA).[39] As of 2024, Password Safe supports integration with over 100 enterprise systems, facilitating automated onboarding and reducing manual credential handling risks that contribute to 80% of breaches involving compromised privileges, per industry analyses.[39] Privileged Remote Access (PRA) extends PAM by providing secure, vendor-agnostic remote sessions with built-in recording, playback, and behavioral analytics to detect anomalies during access. It enforces ephemeral access models, where privileges are granted temporarily and revoked post-session, minimizing persistent elevation risks; sessions can be shadowed or approved in workflows for third-party support.[40] PRA's 2024 updates include enhanced cloud-native deployment options, supporting zero-trust architectures by integrating with identity providers like Okta and Azure AD for seamless MFA and conditional access.[41] Privilege Management for endpoints and servers focuses on runtime elevation controls, allowing standard users to perform approved tasks without full admin rights, thereby containing lateral movement in attacks. Policies define application-specific elevations, with tamper-proof logging and rollback capabilities; it covers Windows, macOS, Linux, and Unix systems, reducing privilege escalation vulnerabilities like those exploited in ransomware campaigns.[42] The solution's endpoint agent enforces application whitelisting and blocks unauthorized scripts, with reporting tied to SIEM tools for holistic visibility.[34] Collectively, these PAM elements operate under BeyondTrust's unified platform, which as of 2025 incorporates machine identity management for non-human accounts like APIs and IoT devices, addressing the expansion of attack surfaces in automated environments. Adoption has been noted in sectors requiring stringent controls, such as finance and government, where PAM reduces mean time to detect privilege misuse from days to minutes via AI-driven analytics.[43] Independent evaluations highlight the platform's scalability for enterprises managing over 100,000 endpoints, though implementation complexity can require specialized tuning for optimal policy efficacy.[44]Remote Support and Access Tools
BeyondTrust Remote Support, rebranded from Bomgar following its acquisition and integration in 2018, delivers enterprise-grade remote troubleshooting and control for IT professionals accessing endpoints worldwide.[4][45] The solution supports connections to servers, workstations, network devices, and unattended systems via secure channels, emphasizing minimal privilege and auditability to mitigate support-related risks.[46][47] Core capabilities encompass full remote desktop control, screen sharing for collaborative sessions, secure file transfers, command shell execution, and automated reboots with reconnection.[48][49] It accommodates diverse platforms, including Windows, Linux, macOS, Chrome OS, iOS, and Android devices, enabling cross-environment support without custom agents in many cases.[46] Jump clients facilitate persistent unattended access for recurring maintenance.[50] Security integrations include a built-in password vault for one-click credential injection, session recording for compliance auditing, and policy-driven permissions that enforce least-privilege access during support interactions.[48] These features align with regulatory requirements such as GDPR, HIPAA, and PCI DSS by providing tamper-proof logs and ephemeral session controls.[46] BeyondTrust complements Remote Support with Privileged Remote Access (PRA), a zero-trust solution for vendor, contractor, and remote employee access to sensitive infrastructure.[51] PRA brokers just-in-time connections through encrypted tunnels, eliminating VPN dependencies and incorporating privileged session management for real-time monitoring and intervention.[52][53] This approach enforces granular policies, multi-factor authentication, and behavioral analytics to prevent lateral movement and credential abuse in hybrid environments.[54]Identity and Threat Visualization Features
BeyondTrust's Identity Security Insights product delivers centralized visualization tools designed to map and monitor identities, entitlements, and associated threats across hybrid environments, including on-premises, cloud, and active directory systems. Launched on August 2, 2023, the solution aggregates data from disparate identity sources to provide a unified dashboard view of accounts, effective privileges, escalation paths, and potential attack vectors, enabling security teams to identify over-privileged users and hidden risks without manual querying.[55][56] Core visualization features include real-time graphical representations of identity relationships and threat indicators, such as anomaly detection for unusual access patterns and mapping of privilege escalation chains that could enable lateral movement by adversaries. The dashboard highlights identity-based threats through proactive alerts and contextual recommendations, drawing on analytics to score risks based on factors like standing privileges and cross-domain entitlements, which are common exploitation points in breaches.[57][58] In its Identity Threat Detection and Response (ITDR) capabilities, the platform extends visualization to cross-domain threats, integrating logs and telemetry to depict attack techniques aligned with frameworks like MITRE ATT&CK, such as reconnaissance via excessive entitlements or persistence through dormant accounts. This allows for simulated attack path analysis, where users can visualize "paths to privilege" that span multiple systems, prioritizing remediation based on exploitability rather than static compliance metrics.[59] Updates in 2024 enhanced these features with AI-driven insights for faster threat correlation, while the 2025 introduction of the Pathfinder platform further unifies visualization under a single AI-powered interface, incorporating holistic dashboards for AI agent risks and just-in-time access modeling to reduce standing privileges visualized as persistent vulnerabilities.[60][61]Security Incidents and Vulnerabilities
2024 Remote Support SaaS Breach
In December 2024, BeyondTrust identified unauthorized access to certain Remote Support SaaS customer instances stemming from the compromise of a root-level API key, which attackers exploited to reset local administrative passwords and initiate sessions.[62] The incident was first detected on December 5, 2024, through monitoring of anomalous behavior, affecting a total of 17 customers out of approximately 3,000 using the SaaS service at the time.[62] [63] BeyondTrust stated that the compromised key enabled attackers to perform these actions but found no evidence of data exfiltration from its own systems or broader account compromises beyond the targeted instances.[62] The breach has been attributed to Silk Typhoon, a Chinese state-sponsored advanced persistent threat (APT) group, which leveraged the access for further intrusions, including into unclassified systems of the U.S. Department of the Treasury.[64] [63] U.S. officials confirmed the Treasury compromise on December 31, 2024, noting that the attackers gained initial entry via the BeyondTrust API key but were contained without accessing sensitive financial data or classified networks.[65] BeyondTrust's investigation, supported by external forensics firms, determined the API key compromise likely occurred prior to December 5, with attackers using it to enumerate and target specific customer environments rather than launching indiscriminate attacks.[62] [66] In response, BeyondTrust immediately revoked the compromised API key, isolated affected instances, and notified all impacted customers by December 8, 2024, while conducting a full audit and enhancing API security controls such as key rotation and least-privilege enforcement.[62] The company also disclosed related product vulnerabilities uncovered during the probe, including CVE-2024-12356, a critical command injection flaw in Remote Support and Privileged Remote Access components, which CISA confirmed was actively exploited in the wild but not directly tied to the SaaS API compromise.[67] No customer data hosted by BeyondTrust was reported stolen, though downstream impacts varied by organization, prompting federal alerts on supply chain risks in remote access tools.[68] [69]Related Product Vulnerabilities (e.g., CVE-2024-12356)
BeyondTrust products, particularly Privileged Remote Access (PRA) and Remote Support (RS), have been affected by multiple vulnerabilities documented as Common Vulnerabilities and Exposures (CVEs), some of which have been actively exploited in the wild.[70][71] In December 2024, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2024-12356 to its Known Exploited Vulnerabilities (KEV) catalog, classifying it as a critical flaw (CVSS score 9.8) in on-premises PRA and RS versions prior to specific patches, enabling unauthenticated remote code execution via crafted requests to the web interface.[70][72] BeyondTrust issued advisory BT24-10 recommending immediate upgrades to mitigate risks, noting that exploitation could lead to full server compromise without authentication.[72] In January 2025, CISA further added CVE-2024-12686 to the KEV list, a command injection vulnerability (CVSS 9.8) in PRA and RS affecting versions up to 24.3, allowing unauthenticated attackers to execute arbitrary operating system commands through malicious client requests.[73] This flaw, detailed in BeyondTrust's advisories, stemmed from insufficient input validation in session handling, with federal agencies required to patch by February 2025 under CISA binding directives.[74] Subsequent disclosures in 2025 included CVE-2025-5309, a high-severity server-side template injection (SSTI) in the chat feature of PRA and RS (CVSS 8.6), disclosed in June via advisory BT25-04, permitting remote code execution on the server by authenticated users with crafted inputs.[75][76] Patches were released for affected versions, emphasizing the need for updated configurations to prevent privilege escalation or data exfiltration.[77] Additionally, CVE-2025-0217 addressed a local authentication bypass in PRA versions before 25.1, allowing privilege escalation for authenticated users.[78] Earlier incidents, such as CVE-2023-4310 (command injection in PRA/RS 23.2.1-23.2.2, CVSS 9.8), highlighted recurring issues in command handling, patched in subsequent releases.[79]| CVE ID | Affected Products | Severity (CVSS) | Description | Disclosure/Patch Date | Source |
|---|---|---|---|---|---|
| CVE-2024-12356 | PRA, RS (pre-patch) | 9.8 (Critical) | Unauthenticated RCE via web interface | Dec 2024 / Immediate patches | [70][72] |
| CVE-2024-12686 | PRA, RS (up to 24.3) | 9.8 (Critical) | Unauthenticated command injection | Jan 2025 / BT24-11 advisory | [73] |
| CVE-2025-5309 | PRA, RS chat feature | 8.6 (High) | SSTI leading to RCE | Jun 2025 / BT25-04 | [75][76] |
| CVE-2025-0217 | PRA (<25.1) | Not specified | Local auth bypass/escalation | May 2025 / Upgrade to 25.1 | [78] |
| CVE-2023-4310 | PRA, RS (23.2.1-23.2.2) | 9.8 (Critical) | Command injection | Sep 2023 / Patched releases | [79] |

