{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreiexyxybbxmatnnhukgha3nztgmjjs3gqgrvfb2blrggalns5bng5e",
"uri": "at://did:plc:6wtxqaikjf62unmnajbfbq5v/app.bsky.feed.post/3mfj3xfclnaw2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreid6t6q5x4dzgr2atae76ek64o4jfr6rvbxobml5tukezisaifeqva"
},
"mimeType": "image/webp",
"size": 20854
},
"path": "/dell-recoverpoint-vms-zero-day-cve-2026-22769-exploited-since-mid-2024/",
"publishedAt": "2026-02-23T05:19:03.000Z",
"site": "https://vpncentral.com",
"tags": [
"News",
"Dell RecoverPoint VMs Zero-Day CVE-2026-22769 Exploited Since Mid-2024",
"VPN Central"
],
"textContent": "China-nexus UNC6201 exploited CVE-2026-22769 in Dell RecoverPoint for VMs since mid-2024. The CVSS 10.0 hardcoded credential flaw grants root access to backup appliances. Google Mandiant discovered active intrusions during incident response. The vulnerability affects versions before 6.0.3.1 HF1. Attackers authenticate as “admin” to Apache Tomcat Manager, upload SLAYSTYLE webshell via “/manager/text/deploy”, and drop BRICKSTORM/GRIMBOLT backdoors […]\n\nThe post Dell RecoverPoint VMs Zero-Day CVE-2026-22769 Exploited Since Mid-2024 appeared first on VPN Central.",
"title": "Dell RecoverPoint VMs Zero-Day CVE-2026-22769 Exploited Since Mid-2024"
}