Back to Intelligence

Dell RecoverPoint Zero-Day CVE-2026-22769 Actively Exploited by Chinese Threat Group UNC6201

SA
Security Arsenal Team
February 22, 2026
5 min read

In the stealthy world of cybersecurity, few things are more alarming than a zero-day vulnerability targeting critical infrastructure backup systems. Security teams often focus on patching operating systems and applications, frequently overlooking the specialized appliances that keep data resilient. However, a new report from Google Mandiant and the Google Threat Intelligence Group (GTIG) has shattered that false sense of security, revealing that a suspected China-nexus threat actor, tracked as UNC6201, has been actively exploiting a maximum severity flaw in Dell RecoverPoint for Virtual Machines since mid-2024.

The vulnerability, designated CVE-2026-22769, carries a CVSS score of 10.0—the highest possible severity rating. This is not a theoretical risk; it is an active, ongoing attack campaign leveraging a basic yet devastating development error: hard-coded credentials.

The Mechanics of the Attack

At its core, CVE-2026-22769 is a case study in why security hygiene during the development lifecycle is non-negotiable. The vulnerability stems from hard-coded credentials embedded within the Dell RecoverPoint software. In a secure environment, unique, rotating keys protect access. In this scenario, the attacker effectively possesses a "skeleton key" baked into the system.

UNC6201 has utilized these credentials to bypass authentication protocols entirely. Once inside the RecoverPoint appliance, the actors gain unauthorized access to the underlying management interface. This access allows them to execute arbitrary code with high privileges. Because RecoverPoint is often integrated deeply into virtualized environments to manage data replication and recovery, a compromise here provides a strategic vantage point. The attackers can move laterally to the virtual machines (VMs) being protected, potentially exfiltrating sensitive data or deploying ransomware, all while hiding in the noise of legitimate backup traffic.

The Threat Actor: UNC6201

Google Mandiant attributes this activity to UNC6201, a cluster with suspected ties to China. This group is known for its patience and operational discipline. By exploiting this zero-day since mid-2024, they have maintained a prolonged foothold in victim environments, likely conducting espionage rather than immediate disruption. The use of a zero-day in backup software suggests a sophisticated intent to maintain persistence even if primary systems are restored from backup, effectively compromising the "safe mode" that organizations rely on during disaster recovery.

Detection and Threat Hunting

Detecting this vulnerability requires looking for anomalies in how the RecoverPoint management interface is accessed and how the underlying Linux-based appliance behaves. Since standard authentication logs may not flag the use of hard-coded credentials, we must look for the effects of the access—specifically unusual process execution or web shell activity.

1. Hunt for Unusual Process Execution on the Appliance

If you have EDR coverage or log forwarding from the underlying Linux OS of the RecoverPoint VM, look for unexpected child processes spawned by the management services.

Script / Code
# Check for recent suspicious processes spawned by common web service users
ps aux | grep -E 'www-data|apache|recoverpoint' | grep -vE 'grep|/opt/RecoverPoint'

2. Identify Dell RecoverPoint Assets

PowerShell can be used to scan your VM infrastructure to identify all instances running Dell RecoverPoint, ensuring they are prioritized for patching.

Script / Code
# Get VMs where the name suggests Dell RecoverPoint presence
Get-VM | Where-Object {$_.Name -like "*RecoverPoint*" -or $_.Guest.OSFullName -like "*Linux*"} | Select-Object Name, State, VMId

3. KQL Query for Suspicious Management Access

If you are forwarding network logs or web logs to Microsoft Sentinel, hunt for successful logins to the RecoverPoint interface that do not originate from known management subnets.

Script / Code
// Hunt for successful logins to Dell RecoverPoint interface from external IPs
DeviceNetworkEvents
| where RemoteUrl contains "RecoverPoint" 
| where ActionType == "ConnectionSuccess" 
| where InitiatingProcessFileName in ("java", "apache", "httpd")
| project Timestamp, DeviceName, RemoteIP, RemotePort, InitiatingProcessAccountName
| where RemoteIP !in ("192.168.0.0/16", "10.0.0.0/8", "172.16.0.0/12") // Exclude known internal ranges

Mitigation Strategies

The presence of a CVSS 10.0 flaw necessitates immediate and aggressive action. Passive monitoring is insufficient given the active exploitation by UNC6201.

  1. Immediate Patching: Dell has released security updates to address CVE-2026-22769. Apply these patches immediately to all RecoverPoint for VMs instances. If you cannot patch immediately, shut down the management interfaces to the internet and restrict access strictly to a jump box.
  2. Credential Rotation: Although the vulnerability involves hard-coded credentials, it is best practice to rotate all administrative and service account credentials associated with the RecoverPoint environment immediately after patching. Assume the attacker has had full access to the credential store.
  3. Network Segmentation: Ensure that RecoverPoint management interfaces are not accessible from the open internet. Place them behind a VPN or a Zero Trust Network Access (ZTNA) solution. Furthermore, isolate the replication traffic between data centers to prevent lateral movement from the backup appliance to production workloads.
  4. Forensic Review: Conduct a thorough review of logs dating back to mid-2024. Look for indicators of compromise (IOCs) associated with UNC6201, including unfamiliar web shells or unauthorized configuration changes within the RecoverPoint cluster.

Conclusion

The exploitation of CVE-2026-22769 serves as a stark reminder that the security of backup infrastructure is as critical as the security of production servers. UNC6201’s campaign demonstrates how threat actors target perceived "safe zones" to maintain persistence. By prioritizing patching for this flaw and implementing the hunting queries provided above, organizations can close this critical vulnerability and deny adversaries a foothold in their virtualized environments.

Related Resources

Security Arsenal Managed SOC Services AlertMonitor Platform Book a SOC Assessment soc-mdr Intel Hub

socthreat-intelmanaged-soczero-daycve-2026-22769dell-recoverpointunc6201threat-hunting

Is your security operations ready?

Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.