BeyondTrust Blunder: Thousands at Risk as Patching Takes a Backseat
Despite warnings of Chinese hackers exploiting a BeyondTrust bug, 8,602 instances remain exposed online. While BeyondTrust cloud customers were patched automatically, self-hosted systems lag. Experts suggest unpatched systems are vulnerable and require manual updates. Self-hosted BeyondTrust deployments could use a crash course in cybersecurity or just a really good patch.

Hot Take:
Looks like some folks still believe in the “if it ain’t broke, don’t fix it” philosophy, except this time, it’s broke, and the hackers are out there fixing themselves a plate of your data!
Key Points:
- The BeyondTrust vulnerability, CVE-2024-12356, is critically serious with a CVSS score of 9.8.
- Despite warnings, 8,602 instances remain exposed online, with 72% located in the US.
- The vulnerability has already been exploited by Chinese state-sponsored actors to infiltrate the US Treasury.
- Cloud users of BeyondTrust were automatically patched, while self-hosted users were left to fend for themselves.
- Experts suggest restricting access to known IPs if patching isn’t possible.
Already a member? Log in here