On February 17, 2026, Dell disclosed a critical zero-day vulnerability, CVE-2026-22769, affecting its RecoverPoint for Virtual Machines product. The vulnerability, which scores a maximum 10.0 on the CVSS scale, is due to hardcoded credentials. Investigations by Google's Threat Intelligence Group and Mandiant revealed that a suspected China-nexus cyberespionage group, tracked as UNC6201, has been actively exploiting this flaw since at least mid-2024. The attackers used this access to deploy webshells and stealthy backdoors, including BRICKSTORM and a new malware called GRIMBOLT, for long-term persistence and data access. Dell has released patch 6.0.3.1 HF1, and all customers are urged to apply it immediately.
The vulnerability resides in the RecoverPoint for Virtual Machines appliance, a solution used for backup and recovery in VMware environments. The core issue is the presence of hardcoded credentials, which allows an unauthenticated remote attacker to gain access to the appliance's underlying operating system with root privileges.
The threat actor, UNC6201, demonstrated a sophisticated attack chain:
The two-year gap between the start of exploitation and public disclosure highlights the effectiveness of the actor's stealth techniques and the critical danger posed by hardcoded credentials in enterprise products.
The attack leverages several techniques mapped to the MITRE ATT&CK framework:
T1190 - Exploit Public-Facing Application: The initial attack vector was the exploitation of the vulnerable RecoverPoint appliance accessible over the network.T1552.004 - Hardcoded Credentials: The root cause of the vulnerability is hardcoded credentials within the product, which the attackers used for initial access.T1505.003 - Web Shell: The deployment of the SLAYSTYLE webshell on the compromised Apache Tomcat server provided the attackers with persistent access and a platform to execute further commands.T1105 - Ingress Tool Transfer: The attackers transferred their backdoors (BRICKSTORM, GRIMBOLT) to the compromised system after gaining initial access.T1027 - Obfuscated Files or Information: The use of native AOT compilation for the GRIMBOLT backdoor is a form of obfuscation intended to make analysis more difficult.The exploitation of CVE-2026-22769 poses a severe risk to organizations. Since RecoverPoint appliances are deeply integrated into virtualization infrastructure and have access to critical backup data, a compromise can have catastrophic consequences:
Security teams should hunt for the following indicators:
| Type | Value | Description |
|---|---|---|
| url_pattern | /manager/html |
Suspicious or unauthorized access attempts to the Apache Tomcat Manager interface on RecoverPoint appliances. |
| process_name | java |
Look for Java processes associated with Tomcat spawning anomalous child processes (e.g., sh, bash, cmd.exe). |
| file_path | /usr/local/tomcat/webapps/ |
Monitor for newly created or modified JSP, WAR, or other executable files in Tomcat web application directories, indicative of webshells like SLAYSTYLE. |
| network_traffic_pattern | Outbound C2 from RecoverPoint appliance | Any outbound network connections from the RecoverPoint appliance to non-Dell or non-standard IP addresses should be considered highly suspicious. |
| command_line_pattern | *ncaot* |
Search for command-line artifacts related to the execution of C#/.NET native AOT compiled binaries like GRIMBOLT. |
/manager/html path.D3-NTA - Network Traffic Analysis.D3-SU - Software Update.D3-NI - Network Isolation.D3-SPP - Strong Password Policy.Applying the vendor-supplied patch (6.0.3.1 HF1) is the most effective way to remediate the vulnerability.
Restricting network access to the RecoverPoint management interface to only trusted administrative hosts significantly reduces the attack surface.
While the flaw was hardcoded, this incident underscores the importance of eliminating default or weak credentials from all systems. This mitigation encourages a culture of strong credential management.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats