Remote Support
by Beyondtrust
Take action — actively targeted
Remote Support is actively targeted by attackers. A significant proportion of its known vulnerabilities are being exploited.
What to do
- Apply all available updates immediately
- Review your exposure — is this internet-facing?
- Monitor vendor advisories for this product
What Attackers Target
Vulnerabilities with high exploit probability
50.0%
Confirmed actively exploited (CISA)
50.0%
Public exploit code available
0.0%
Based on 6 known vulnerabilities. Percentages show the proportion that are actively dangerous — a low percentage means most vulnerabilities in this product are not being exploited.
Most Dangerous Vulnerabilities
| CVE | CVSS | Exploit Probability | Confirmed |
|---|---|---|---|
| CVE-2024-12356 | 9.8 | 93.8% | Yes |
| CVE-2026-1731 | 9.8 | 79.6% | Yes |
| CVE-2024-12686 | 6.6 | 31.5% | Yes |
| CVE-2023-4310 | 9.8 | 2.7% | — |
| CVE-2025-5309 | 9.8 | 1.4% | — |
| CVE-2017-5996 | 7.8 | 0.1% | — |
66
/ 100
high-risk
Active Threat
38/50 · High
Exploit Availability
28/50 · Moderate
Score uses Wilson score intervals to account for sample size. Products with few CVEs are scored conservatively.