Critical zero-day vulnerability is being actively exploited in Dell RecoverPoint

Home/Application Security, Cybersecurity, Exploitation, Secuirty Update, Security Advisory, vulnerability/Critical zero-day vulnerability is being actively exploited in Dell RecoverPoint

Critical zero-day vulnerability is being actively exploited in Dell RecoverPoint

The flaw, tracked as CVE-2026-22769, has a maximum CVSS score of 10.0 (Critical) and has been exploited since at least mid-2024.

Incident response investigations link the activity to UNC6201, a China-linked threat cluster. The group shares overlaps with Silk Typhoon (UNC5221).

Security researchers from Mandiant and Google Threat Intelligence Group (GTIG) observed attackers using this vulnerability to move laterally across networks, maintain long-term persistence, and deploy advanced malware.

The malware used in attacks includes SLAYSTYLE (web shell), BRICKSTORM (backdoor), and GRIMBOLT (new backdoor).

Although the initial entry method is still unknown, UNC6201 commonly targets edge devices such as VPN appliances to gain access.

What Caused the Vulnerability?

The issue is due to hardcoded default admin credentials inside Dell RecoverPoint’s Apache Tomcat Manager configuration.

The credentials were found in:

/home/kos/tomcat9/tomcat-users.xml

Because of this, unauthenticated remote attackers can log into the Tomcat Manager.

Tomcat Manager allows software deployment and administrative tasks. Attackers abused the /manager/text/deploy endpoint to upload malicious WAR files.

In real attacks, this was used to deploy the SLAYSTYLE web shell, giving attackers root-level command execution on the appliance.

Shift to GRIMBOLT Malware

In September 2025, attackers moved from using BRICKSTORM to a new malware called GRIMBOLT.

GRIMBOLT is written in C#, compiled using Native Ahead-of-Time (AOT), does not include Common Intermediate Language (CIL) metadata, and is packed with UPX.

AOT compilation converts code directly into machine-native code during build time. This makes detection harder because traditional security tools often scan CIL metadata.

To stay persistent, attackers modify the legitimate convert_hosts.sh script so the backdoor runs automatically at boot through rc.local.

Advanced Network Evasion

UNC6201 also uses advanced stealth techniques.

Attackers create temporary hidden network interfaces inside ESXi virtual machines, known as “Ghost NICs.” This allows silent movement between internal networks and SaaS infrastructure without triggering monitoring tools.

They also use Single Packet Authorization (SPA). Attackers monitor traffic on port 443 for a specific hexadecimal string. When detected, the source IP is added to an allowlist. Only that IP can access port 10443, while all other traffic is redirected silently. This hides the command-and-control (C2) channel from scanners and security tools.

Vulnerability Details

CVE IDCVSS ScoreDescription
CVE-2026-2276910.0 (Critical)A hardcoded credential vulnerability in Dell RecoverPoint for Virtual Machines allows unauthenticated remote attackers to access the underlying OS and establish root-level persistence.

Affected Versions & Required Actions

Dell has issued urgent mitigation guidance.

ProductAffected VersionsRemediation Action
RecoverPoint for Virtual Machines5.3 SP4 P1Migrate to 6.0 SP3, then upgrade to 6.0.3.1 HF1 OR apply remediation script DSA-2026-079
RecoverPoint for Virtual Machines6.0 through 6.0 SP3 P1Upgrade to 6.0.3.1 HF1 OR apply remediation script DSA-2026-079
RecoverPoint for Virtual Machines5.3 SP4 and earlierUpgrade to 5.3 SP4 P1 or a 6.x version, then apply the remediation script

Indicators of Compromise (IOCs)

Indicator ValueTypeMalware FamilyFile Name / Context
24a11a26a2586f4fba7bfe89df2e21a0809ad85069e442da98c37c4add369a0cSHA256GRIMBOLTsupport
dfb37247d12351ef9708cb6631ce2d7017897503657c6b882a711c0da8a9a591SHA256GRIMBOLTout_elf_2
92fb4ad6dee9362d0596fda7bbcfe1ba353f812ea801d1870e37bfc6376e624aSHA256SLAYSTYLEdefault_jsp.java
aa688682d44f0c6b0ed7f30b981a609100107f2d414a3a6e5808671b112d1878SHA256BRICKSTORMN/A
2388ed7aee0b6b392778e8f9e98871c06499f476c9e7eae6ca0916f827fe65dfSHA256BRICKSTORMsplisten
320a0b5d4900697e125cebb5ff03dee7368f8f087db1c1570b0b62f5a986d759SHA256BRICKSTORMN/A
90b760ed1d0dcb3ef0f2b6d6195c9d852bcb65eca293578982a8c4b64f51b035SHA256BRICKSTORMN/A
45313a6745803a7f57ff35f5397fdf117eaec008a76417e6e2ac8a6280f7d830SHA256BRICKSTORMN/A
wss://149.248.11.71/rest/apisessionC2 EndpointGRIMBOLTN/A
149.248.11.71C2 IPGRIMBOLTN/A
By | 2026-02-18T11:06:40+05:30 February 18th, 2026|Application Security, Cybersecurity, Exploitation, Secuirty Update, Security Advisory, vulnerability|

About the Author:

FirstHackersNews- Identifies Security

Leave A Comment

Subscribe to our newsletter to receive security tips everday!