Latest Dell RecoverPoint vulnerability: CVE-2026-22769 #
Dell disclosed certain versions of Dell RecoverPoint for Virtual Machines (RP4VMs) contain a hardcoded credential vulnerability. Successful exploitation could allow a remote, unauthenticated adversary with knowledge of the hardcoded credential to gain unauthorized access to the underlying operating system and achieve root-level persistence. The vulnerability has been designated CVE-2026-22769 and has been rated critical with a CVSS score of 10.0.
There is evidence that this vulnerability is being actively exploited in the wild.
The following versions are affected
- RecoverPoint for Virtual Machines versions prior to 6.0.3.1 HF1
What is Dell RecoverPoint for Virtual Machines? #
Dell RecoverPoint for Virtual Machines is a software-based orchestration tool that provides continuous data protection for VMware environments by capturing and replicating hypervisor-level write operations to a journal, allowing a VM to be rolled back to any specific point in time.
What is the impact? #
Successful exploitation of the vulnerabilities would allow an adversary to gain unauthorized access to the underlying operating system and achieve root-level persistence.
Are updates or workarounds available? #
Users are encouraged to update to the latest version as quickly as possible:
- RecoverPoint for Virtual Machines upgrade to version 6.0.3.1 HF1 and later
If an immediate upgrade is not feasible, apply the remediation script for DSA-2026-079 as soon as possible to mitigate risk.
How to find potentially vulnerable systems with runZero #
From the Asset Inventory, use the following query to locate potentially impacted assets:
os:="EMC RecoverPoint" OR hw:="EMC RecoverPoint"