Intelligence BriefFebruary 17, 2026
CVE-2026-22769

Dell Recoverpoint For Virtual Machines — CWE-798

CVSS 10 CRITICALKEV CONFIRMED
EPSS Probability100.0%

CVE-2026-22769 (CRITICAL, CVSS 10.0) in Dell actively exploited (CISA KEV): Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a hardcoded credential vulnerability allowing unauthenticated remote attackers to gain root-level access to the underlying operating system.

Overview

Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a hardcoded credential vulnerability. This is considered critical as an unauthenticated remote attacker with knowledge of the hardcoded credential could potentially exploit this vulnerability leading to unauthorized access to the underlying operating system and root-level persistence. Dell recommends that customers upgrade or apply one of the remediations as soon as possible.

This vulnerability is listed in the CISA Known Exploited Vulnerabilities (KEV) catalog, added 2026-02-18. Federal agencies must remediate by 2026-02-21.

Technical Details

CVSS Score: 10.0 (CRITICAL) CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H RiskScore: 100/100 (cvss weight: 30, exploit status weight: 26, epss weight: 7, age weight: 7, advisory weight: 3, epss percentile bonus: 24) EPSS Score: Not available Weaknesses (CWE): CWE-798, CWE-798

Why This Matters

A CVSS score of 10.0 (CRITICAL) places this vulnerability in the highest risk tier. With confirmed active exploitation in the wild (CISA KEV), this vulnerability represents an urgent patching priority for all affected organizations. Unpatched systems are exposed to remote attackers seeking to gain unauthorized access.

Affected Versions

Remediation

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Apply all available patches from the vendor immediately. Prioritize internet-facing systems and critical infrastructure components. If patches are not available, implement network segmentation to limit exposure.

References


Powered by RiskScore — https://api.riskscore.dev