The flaw, tracked as CVE-2026-22769, has a maximum CVSS score of 10.0 (Critical) and has been exploited since at least mid-2024.
Incident response investigations link the activity to UNC6201, a China-linked threat cluster. The group shares overlaps with Silk Typhoon (UNC5221).
Security researchers from Mandiant and Google Threat Intelligence Group (GTIG) observed attackers using this vulnerability to move laterally across networks, maintain long-term persistence, and deploy advanced malware.
The malware used in attacks includes SLAYSTYLE (web shell), BRICKSTORM (backdoor), and GRIMBOLT (new backdoor).
Although the initial entry method is still unknown, UNC6201 commonly targets edge devices such as VPN appliances to gain access.
What Caused the Vulnerability?
The issue is due to hardcoded default admin credentials inside Dell RecoverPoint’s Apache Tomcat Manager configuration.
The credentials were found in:
/home/kos/tomcat9/tomcat-users.xml
Because of this, unauthenticated remote attackers can log into the Tomcat Manager.
Tomcat Manager allows software deployment and administrative tasks. Attackers abused the /manager/text/deploy endpoint to upload malicious WAR files.
In real attacks, this was used to deploy the SLAYSTYLE web shell, giving attackers root-level command execution on the appliance.
Shift to GRIMBOLT Malware
In September 2025, attackers moved from using BRICKSTORM to a new malware called GRIMBOLT.
GRIMBOLT is written in C#, compiled using Native Ahead-of-Time (AOT), does not include Common Intermediate Language (CIL) metadata, and is packed with UPX.
AOT compilation converts code directly into machine-native code during build time. This makes detection harder because traditional security tools often scan CIL metadata.
To stay persistent, attackers modify the legitimate convert_hosts.sh script so the backdoor runs automatically at boot through rc.local.
Advanced Network Evasion
UNC6201 also uses advanced stealth techniques.
Attackers create temporary hidden network interfaces inside ESXi virtual machines, known as “Ghost NICs.” This allows silent movement between internal networks and SaaS infrastructure without triggering monitoring tools.
They also use Single Packet Authorization (SPA). Attackers monitor traffic on port 443 for a specific hexadecimal string. When detected, the source IP is added to an allowlist. Only that IP can access port 10443, while all other traffic is redirected silently. This hides the command-and-control (C2) channel from scanners and security tools.
Vulnerability Details
| CVE ID | CVSS Score | Description |
|---|---|---|
| CVE-2026-22769 | 10.0 (Critical) | A hardcoded credential vulnerability in Dell RecoverPoint for Virtual Machines allows unauthenticated remote attackers to access the underlying OS and establish root-level persistence. |
Affected Versions & Required Actions
Dell has issued urgent mitigation guidance.
| Product | Affected Versions | Remediation Action |
|---|---|---|
| RecoverPoint for Virtual Machines | 5.3 SP4 P1 | Migrate to 6.0 SP3, then upgrade to 6.0.3.1 HF1 OR apply remediation script DSA-2026-079 |
| RecoverPoint for Virtual Machines | 6.0 through 6.0 SP3 P1 | Upgrade to 6.0.3.1 HF1 OR apply remediation script DSA-2026-079 |
| RecoverPoint for Virtual Machines | 5.3 SP4 and earlier | Upgrade to 5.3 SP4 P1 or a 6.x version, then apply the remediation script |
Indicators of Compromise (IOCs)
| Indicator Value | Type | Malware Family | File Name / Context |
|---|---|---|---|
24a11a26a2586f4fba7bfe89df2e21a0809ad85069e442da98c37c4add369a0c | SHA256 | GRIMBOLT | support |
dfb37247d12351ef9708cb6631ce2d7017897503657c6b882a711c0da8a9a591 | SHA256 | GRIMBOLT | out_elf_2 |
92fb4ad6dee9362d0596fda7bbcfe1ba353f812ea801d1870e37bfc6376e624a | SHA256 | SLAYSTYLE | default_jsp.java |
aa688682d44f0c6b0ed7f30b981a609100107f2d414a3a6e5808671b112d1878 | SHA256 | BRICKSTORM | N/A |
2388ed7aee0b6b392778e8f9e98871c06499f476c9e7eae6ca0916f827fe65df | SHA256 | BRICKSTORM | splisten |
320a0b5d4900697e125cebb5ff03dee7368f8f087db1c1570b0b62f5a986d759 | SHA256 | BRICKSTORM | N/A |
90b760ed1d0dcb3ef0f2b6d6195c9d852bcb65eca293578982a8c4b64f51b035 | SHA256 | BRICKSTORM | N/A |
45313a6745803a7f57ff35f5397fdf117eaec008a76417e6e2ac8a6280f7d830 | SHA256 | BRICKSTORM | N/A |
wss://149.248.11.71/rest/apisession | C2 Endpoint | GRIMBOLT | N/A |
149.248.11.71 | C2 IP | GRIMBOLT | N/A |





Leave A Comment