Microsoft and Dell Patch Actively Exploited Zero-Day Vulnerabilities

Microsoft Patches Windows Admin Center Flaw as Dell Discloses Actively Exploited RecoverPoint Zero-Day

CRITICAL
February 27, 2026
February 28, 2026
3m read
VulnerabilityPatch ManagementThreat Actor

Related Entities(initial)

Threat Actors

UNC6201

Organizations

Products & Tech

Windows Admin CenterDell RecoverPoint for Virtual Machines

Other

BRICKSTORMGRIMBOLT

CVE Identifiers

CVE-2026-26119
HIGH
CVSS:8.8
CVE-2026-22769
CRITICAL
CVSS:10

Full Report(when first published)

Executive Summary

Enterprise IT administrators are facing two new significant threats, with patches now available. Microsoft has addressed a critical privilege escalation vulnerability, CVE-2026-26119, in its Windows Admin Center platform. Separately and more urgently, Dell has disclosed that a critical, CVSS 10.0 zero-day vulnerability, CVE-2026-22769, in its RecoverPoint for Virtual Machines solution has been under active exploitation by a suspected China-linked threat group since mid-2024. The Dell flaw allows for complete system takeover and has been added to CISA's KEV catalog. Organizations using these products are urged to apply the respective patches immediately.


Vulnerability Details

Dell RecoverPoint for VMs: CVE-2026-22769

This is a critical vulnerability with a CVSS score of 10.0, indicating maximum severity.

  • Flaw: The vulnerability is due to hard-coded credentials within the RecoverPoint for VMs software. An unauthenticated attacker can use these static credentials to gain root-level access to the appliance.
  • Exploitation: A suspected China-linked threat group, tracked as UNC6201, has been exploiting this flaw since mid-2024. They use the access to establish persistent backdoors and deploy malware.
  • Malware: The attackers have been observed deploying two malware families:
    • BRICKSTORM: A backdoor providing persistent access.
    • GRIMBOLT: Another malicious tool used in the attack chain.
  • TTPs: Attackers have been seen deploying web shells via the Tomcat Manager on compromised appliances, enabling deep system control and facilitating lateral movement.
  • MITRE ATT&CK:

Microsoft Windows Admin Center: CVE-2026-26119

This is a critical vulnerability with a CVSS score of 8.8.

  • Flaw: The vulnerability is a privilege escalation issue resulting from an improper authentication mechanism.
  • Exploitation: An attacker who is already authenticated on the same network as the Windows Admin Center can exploit this flaw to elevate their privileges to match those of the user running the WAC system. If WAC is running as a high-privileged user, the attacker gains those same privileges.
  • Status: While Microsoft has not observed active exploitation, it has assessed that exploitation is "more likely," indicating a high risk.
  • MITRE ATT&CK:

Impact Assessment

  • Dell CVE-2026-22769: A compromise of a data recovery appliance is extremely severe. Attackers could corrupt or delete backups, preventing recovery after a ransomware attack. They could also use the appliance as a highly privileged pivot point to move laterally across the virtual infrastructure.
  • Microsoft CVE-2026-26119: Gaining elevated privileges via Windows Admin Center allows an attacker to manage and potentially compromise any servers connected to that WAC instance, leading to widespread domain compromise.

Remediation Steps

Immediate patching is required for both vulnerabilities.

  • For Dell CVE-2026-22769:

    1. Upgrade: Customers must upgrade to a patched version of Dell RecoverPoint for Virtual Machines immediately.
    2. Network Segmentation: Dell strongly advises deploying the appliances within a segmented, protected network with no direct exposure to the internet. This aligns with D3FEND's Network Isolation (D3-NI).
    3. Threat Hunt: Organizations should hunt for signs of compromise, including the presence of BRICKSTORM or GRIMBOLT malware and any unauthorized web shells in Tomcat directories.
  • For Microsoft CVE-2026-26119:

    1. Upgrade: Update to Windows Admin Center version 2511 or later. The patch was released in December 2025, so organizations may already be protected if they maintain regular update cycles. This is an application of D3FEND's Software Update (D3-SU).

Timeline of Events

1
June 1, 2024
Threat actor UNC6201 begins actively exploiting the Dell RecoverPoint zero-day (CVE-2026-22769).
2
December 1, 2025
Microsoft releases Windows Admin Center version 2511, patching CVE-2026-26119.
3
February 27, 2026
Dell discloses the active exploitation of CVE-2026-22769 and releases patches.
4
February 27, 2026
This article was published

Article Updates

February 28, 2026

New details emerge for Microsoft Windows Admin Center flaw (CVE-2026-26119), including vulnerability type, discoverer, detailed detection methods, and enhanced remediation guidance.

MITRE ATT&CK Mitigations

Applying patches for both the Dell and Microsoft vulnerabilities is the only way to remediate them.

Isolating critical management appliances like Dell RecoverPoint from the general network and the internet drastically reduces the attack surface.

Vendors must avoid using hard-coded credentials. End-users must change all default passwords upon deployment.

Sources & References(when first published)

Top 5 Cybersecurity News Stories February 27, 2026
DIESEC (diesec.com) February 27, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Zero-DayVulnerabilityDellMicrosoftUNC6201CVE-2026-22769CVE-2026-26119China

📢 Share This Article

Help others stay informed about cybersecurity threats