2026 Q1 Report: AI-based Attacks are Rising and Putting Enterprises at Risk

CVE-2026-22769

Critical Dell RecoverPoint Vulnerability Enables Remote Root Takeover: CVE-2026-22769 Analysis

CVSS Gauge
CVSS Needle

Summary

Due to hardcoded credentials in the Apache Tomcat Manager configuration, CVE-2026-22769 is a severe vulnerability in Dell RecoverPoint for Virtual Machines that enables an unauthenticated remote attacker to obtain root-level access and run commands on the system. The China-affiliated threat organization UNC6201 has been actively exploiting the vulnerability since at least mid-2024. They have used it to create persistence, construct web shells and backdoors, and move laterally across VMware systems. Because it affects versions older than 6.0.3.1 HF1, it must be fixed right away to avoid complete system compromise and long-term undiscovered access.

Urgent Actions Required

Which Systems Are Vulnerable to CVE-2026-22769?

Technical Overview

How Does the CVE-2026-22769 Exploit Work?

The attack typically follows these steps:

CVE-2026-20131

What Causes CVE-2026-22769?

Vulnerability Root Cause:

This flaw is due to hardcoded credentials in the Apache Tomcat Manager config, allowing attackers to log in remotely without valid credentials and gain full system access.

How Can You Mitigate CVE-2026-22769?

If immediate patching is delayed or not possible:

  • Limit access to RecoverPoint management interfaces to trusted networks only.
  • Block any internet exposure of the appliance.
  • Restrict or disable access to the Tomcat Manager interface.
  • Monitor logs for unusual /manager access or WAR file uploads.
  • Check for suspicious files or web shells in Tomcat directories.

Which Assets and Systems Are at Risk?

Will Patching CVE-2026-22769 Cause Downtime?

Patch application impact: May require planned downtime during upgrade to version 6.0.3.1 HF1 or when applying remediation.

Mitigation (if immediate patching is not possible): Limit access to management interfaces and avoid internet exposure. This reduces risk but does not fix the issue.

How Can You Detect CVE-2026-22769 Exploitation?

Exploitation Signatures:

Look for access to Apache Tomcat Manager endpoints such as /manager/html or /manager/text/deploy, especially successful logins using default or unexpected credentials and WAR file upload activity.

MITRE ATT&CK Mapping:

Indicators of Compromise (IOCs/IOAs):

Behavioral Indicators:

Alerting Strategy:

Remediation & Response

Compliance & Governance Notes

CVSS Breakdown Table

MetricValue Description
Base Score10.0Critical severity indicating maximum impact and ease of exploitation
Attack Vector Network Can be exploited remotely over network-exposed management interfaces
Exploitation is straightforward with crafted inputLowNo special conditions required for successful exploitation
Privileges RequiredNoneDoes not require authentication before exploitation
User InteractionNoneNo user involvement needed
ScopeChangedCompromise can impact systems beyond the vulnerable component
Confidentiality Impact HighFull access to sensitive data, including backups and configurations
Integrity ImpactHighAbility to alter system configurations and backup data
Availability ImpactHighCan disrupt or disable recovery and replication services

Related Readings

One Platform for All Adversaries

See Fidelis in action. Learn how our fast and scalable platforms provide full visibility, deep insights, and rapid response to help security teams across the World protect, detect, respond, and neutralize advanced cyber adversaries.