Threat Advisory

Analyst Advisory: Critical Zero-Day CVE-2026-22769 Exploited in Dell RecoverPoint for VMs

Active exploitation of CVE-2026-22769 in Dell RecoverPoint for VMs — web shells, root persistence, and VMware pivoting observed. Patch immediately.

TLT
Threat Landscape Team
2026-02-186 min read

Executive Summary

Analysis of recent threat intelligence reveals the long-term exploitation of CVE-2026-22769, a critical zero-day vulnerability in Dell RecoverPoint for Virtual Machines (VMs). Since mid-2024, threat actors have leveraged hardcoded credentials within the appliance's Tomcat Manager to gain unauthenticated remote access, deploy web shells, obtain root persistence, and pivot into virtualized environments.

Technical Analysis: Vulnerability & Exploitation

CVE-2026-22769 is a hardcoded-credential vulnerability in the Tomcat Manager component of Dell RecoverPoint appliances that permits unauthenticated administrative access.

Initial Access & Execution

  • Operators use the tool SLAYSTYLE to exploit the hardcoded credentials and upload malicious WAR files (web shells).
  • Uploaded WARs provide remote command execution and lead to root-level persistence on the appliance OS.

Persistent Foothold

  • Operators modify convert_hosts.sh (invoked from rc.local) to ensure backdoors survive reboots.

Malware Evolution: GRIMBOLT

  • In late 2025, actors shifted to GRIMBOLT, an AOT-compiled, UPX-packed C# backdoor that improves execution on constrained appliances and reduces static-detection effectiveness.

Advanced Pivoting: "Ghost NICs" and SPA

  • Ghost NICs: attackers create ephemeral, hidden virtual NICs on ESXi VMs to tunnel traffic and pivot without standard forensic artifacts.
  • iptables Single Packet Authorization (SPA): appliances monitor port 443 for a hex trigger token, then temporarily whitelist and proxy traffic to port 10443.

Threat Actor Profile: UNC6201 (Silk Typhoon)

EntityRoleRelationship
UNC6201Threat ActorPrimary operator targeting CVE-2026-22769
SLAYSTYLEExploit ToolCustom tool designed to exploit the Dell RecoverPoint zero-day.
GRIMBOLTBackdoorAOT-compiled C# backdoor used for high-performance persistence.
BRICKSTORMBackdoorLegacy C# backdoor often used in tandem with GRIMBOLT.
Silk TyphoonIntrusion-setBroader attribution (also known as UNC5221) targeting gov/tech sectors.

MITRE ATT&CK Mapping

TacticTechnique IDTechnique NameDescription
Initial AccessT1190Exploit Public-Facing ApplicationExploitation of Tomcat Manager via hardcoded credentials.
PersistenceT1547.001Boot or Logon Autostart ExecutionModification of convert_hosts.sh for boot-time execution.
EvasionT1027.002Software PackingUse of UPX and Native AOT compilation to hinder analysis.
Lateral MovementT1090ProxyUse of iptables SPA and "Ghost NICs" for stealthy pivoting.

Mitigation & Recommendations

  1. Immediate Patching: Upgrade to 6.0.3.1 HF1, 5.3 SP4 P1, or newer versions immediately to remediate the hardcoded credential risk.
  2. Network Isolation: Ensure RecoverPoint appliances are not exposed to the public internet — place them in isolated management VLANs with strict ingress/egress filtering.
  3. Persistence Hunting:
    • Audit /usr/local/ipcenter/scripts/convert_hosts.sh for unauthorized modifications.
    • Check for unauthorized WAR files in the Tomcat webapps directory.
  4. Virtual Infrastructure Audit: Use VMware management tools to scan for unexpected or ephemeral NICs ("Ghost NICs") attached to VMs.
  5. Traffic Analysis: Monitor for SPA triggers on port 443 followed by redirection to port 10443.

Indicators & References


If your environment uses RecoverPoint for VMs, prioritize patching and conduct the hunting steps above immediately.

Ready to Transform Your Threat Intelligence?

See how Threat Landscape can reduce alert fatigue and improve your security operations