Let's not sugarcoat it: Dell, a name that enterprises trust to keep their precious business data safe, just handed the keys to root access over to anyone with the patience to crack open a firmware update. The culprit? CVE-2026-22769—a critical zero-day vulnerability scoring a flawless 10 on the CVSS panic meter—has been up for grabs in Dell's RecoverPoint for Virtual Machines (RP4VM) software since at least mid-2024. Nobody likes to read about hardcoded credentials popping up in their backup system, but here we are. If you were hoping attackers would skip this year's biggest security clown show, think again.
Hardcoded Credentials: Still A Thing, Apparently
It’s 2026, and we’re somehow still talking about vendors baking hardcoded credentials into mission-critical infrastructure products. This bug doesn’t require clever social engineering, phishing, or some baroque supply chain compromise—the attacker just needs the right static password. That’s it. Unauthenticated remote root access, with persistent control on the underlying OS, sitting in production deployments for years. Irony dies a little more every time you realize your "disaster recovery" solution is the disaster.
Meet Your Friendly Neighborhood Cyberespionage Collective
Unsurprisingly, someone noticed. Chinese cyber espionage group UNC6201 (yes, the same crowd that has become worryingly proficient at poking holes in Western IT) pounced on the bug and ran wild. If your organization relies on Dell RP4VM for business continuity, you may already have hosted some uninvited guests. Since mid-2024, UNC6201 leveraged CVE-2026-22769 to move laterally across victims’ networks, digging in deep like unwelcome squatters who picked up root access at a garage sale.
They didn't just stop at entry. The group planted malware tailored to evade all but the sharpest eyes: first the BRICKSTORM backdoor, then—upping the ante in September 2025—a slick, C#-based backdoor dubbed GRIMBOLT. Compiling that one AOT (ahead-of-time) strips it of handy metadata, making reverse engineering a royal pain for incident responders. Grabbing persistence on backup appliances—often after security teams have declared the incident "contained" elsewhere—lets attackers quietly plot their next move while defenders are lulled by a false sense of closure.
Evasion Tactics for the Modern Threat Actor
You might expect amateur hour from a ransomware operator, but UNC6201 plays at a different level. Take their "Ghost NICs": they temporarily spawn network interfaces on ESXi virtual machines, using them to bounce deeper into internal or SaaS networks. Once the malicious traffic stops, so do the interfaces—poof, like they were never there.
Then comes Single Packet Authorization (SPA). UNC6201 scripts up iptables on vCenter appliances to watch for a single hexadecimal string on port 443. When the right signal comes through, that source IP instantly gets C2 access to a hidden management port, while the rest of the world gets rerouted into digital oblivion. Practical, sneaky, and very effective at dodging your fancy next-gen firewalls.
Why Attacking Backups Is So Effective
Targeting backup and recovery appliances isn't just a means to annoy IT managers. It's a genuine threat to organizational survival. If you poison the backups, you don’t just risk leaks or downtime—you cripple a company’s ability to rebound from ransomware or even basic human error. Attackers know that if they get root on the backup system, they effectively own the disaster recovery playbook. Responders can recover files until they’re blue in the face; if your backups are compromised, so is your business.
It’s bad enough to picture nation-state adversaries rooting around in your main production environments. It’s worse knowing they’re sitting invisibly in the one system everyone assumes is "off-limits." Too many organizations keep their backup infrastructure on the same flat network as everything else, blissfully unaware that their "last line of defense" is secured with little more than a post-it password under the administrator keyboard.
Dell’s Cleanup Doesn’t Mean You’re Safe Just Yet
To their credit, Dell didn't completely bury the news. The company pushed out an advisory, released version 6.0.3.1 HF1, and wrote a remediation script. The guidance? Patch, now, or brace for impact. But let’s be honest: countless organizations lag behind, stuck in change control purgatory or waiting for yet another approvals meeting. If your RP4VM install predates the fix, attackers may have already slipped past your perimeter—and with the Ghost NICs and SPA tricks, you’ll barely notice a thing.
Of course, Dell's official stance boils down to: "Keep your recovery appliances in a tightly segmented, access-controlled internal network behind firewalls." The implication is clear: if you didn’t already protect these systems, you’re on your own. And vendors will never stop reminding you that you are responsible for compensating for their design choices in your own production settings.
Lessons Everyone Ignores Until It’s Too Late
- If your disaster recovery system is compromised, so is your disaster recovery plan.
- Hardcoded credentials aren’t “forgotten shortcuts.” They’re loaded weapons, left under the bed for years.
- Nation-state groups like UNC6201 have a bigger budget, more time, and a stronger work ethic than half of the vendors shipping your favorite appliances.
- Backups should never reside on the same flat network as the assets they’re supposed to protect. This isn’t rocket science—it’s basic common sense.
- Every "invisible" pivot or C2 channel should make you question the point of your seven-figure SIEM investment.
- If you haven’t patched yet, assume you’re compromised and start looking for signs of persistence you won’t spot in the usual places.
So, What Now?
Maybe this will be the industry’s wake-up call. Maybe not. As long as even your backups have backdoors, the only thing more certain than another breach is another vendor reminder to "patch now." And if things go the way they usually do, you’ll probably forward this article to your boss, sigh, and hope it doesn’t happen to you—until it does.


