{"id":43792,"date":"2026-02-20T00:31:39","date_gmt":"2026-02-19T16:31:39","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/20\/cisa-orders-feds-to-patch-actively-exploited-dell-flaw-within-3-days\/"},"modified":"2026-02-20T00:31:39","modified_gmt":"2026-02-19T16:31:39","slug":"cisa-orders-feds-to-patch-actively-exploited-dell-flaw-within-3-days","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/20\/cisa-orders-feds-to-patch-actively-exploited-dell-flaw-within-3-days\/","title":{"rendered":"CISA orders feds to patch actively exploited Dell flaw within 3 days"},"content":{"rendered":"\n<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" height=\"900\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2025\/01\/13\/CISA--headpic.jpg\" width=\"1600\" alt=\"CISA orders feds to patch actively exploited Dell flaw within 3 days\"><\/p>\n<p>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) ordered government agencies to patch their systems within three days against a&nbsp;maximum-severity Dell vulnerability that has been under active exploitation since&nbsp;mid-2024.<\/p>\n<p>According to&nbsp;security researchers from Mandiant and the Google Threat Intelligence Group (GTIG),&nbsp;this&nbsp;hardcoded-credential vulnerability (<a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2026-22769\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2026-22769<\/a>) in Dell&#8217;s RecoverPoint (a solution used for VMware virtual machine backup and recovery) is <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/chinese-hackers-exploiting-dell-zero-day-flaw-since-mid-2024\/\" target=\"_blank\" rel=\"nofollow noopener\">being&nbsp;exploited by&nbsp;a suspected Chinese hacking&nbsp;group<\/a> tracked as UNC6201.<\/p>\n<p>After gaining access to a&nbsp;victim&#8217;s network in CVE-2026-22769 attacks, UNC6201 deploys several malware payloads, including a newly identified backdoor called Grimbolt. This malware is built using a relatively new compilation technique that makes it harder to analyze than its predecessor, the&nbsp;<a href=\"https:\/\/www.bleepingcomputer.com\/tag\/BRICKSTORM\/\" target=\"_blank\" rel=\"nofollow noopener\">Brickstorm<\/a>&nbsp;backdoor.<\/p>\n<div align=\"center\" style=\"width:98%; margin:0 auto; text-align:center; padding:4px; background:#f0f0f0; border:1px solid #ccc; border-radius:6px;\">  <a href=\"https:\/\/www.wiz.io\/lp\/ai-security-board-report-template?utm_source=bleepingcomputer&amp;utm_medium=display&amp;utm_campaign=FY26Q4_INB_FORM_AI-Security-Board-Report-Template&amp;sfcid=701Vh00000Wn7E1IAJ&amp;utm_term=FY27-bleepingcomputer-article-970x250&amp;utm_content=AI-Board-Report\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/w\/ai-security-board-report-template.jpg\" style=\"margin-top: 0px;\" alt=\"CISA orders feds to patch actively exploited Dell flaw within 3 days\"><\/a> <\/div>\n<p>While the group swapped Brickstorm for Grimbolt in September 2025, it&#8217;s not yet clear whether this switch was part of a&nbsp;planned upgrade or &#8220;a reaction to incident response efforts led by Mandiant and other industry partners.&#8221;<\/p>\n<p>&#8220;Analysis of incident response engagements revealed that UNC6201, a suspected PRC-nexus threat cluster, has exploited this flaw since at least mid-2024 to move laterally, maintain persistent access, and deploy malware including SLAYSTYLE, BRICKSTORM, and a novel backdoor tracked as GRIMBOLT,&#8221; they said.<\/p>\n<p>The security researchers have also found overlaps between UNC6201 and the Silk Typhoon Chinese state-backed cyberespionage group (although the two are not considered identical by GTIG), also tracked as UNC5221 and&nbsp;known for exploiting Ivanti zero-days to&nbsp;<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ivanti-epmm-flaw-exploited-by-chinese-hackers-to-breach-govt-agencies\/\" target=\"_blank\" rel=\"nofollow noopener\">target government agencies<\/a>&nbsp;with custom&nbsp;<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/google-chinese-hackers-likely-behind-ivanti-vpn-zero-day-attacks\/\" target=\"_blank\" rel=\"nofollow noopener\">Spawnant<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ivanti-connect-secure-zero-days-exploited-to-deploy-custom-malware\/\" target=\"_blank\" rel=\"nofollow noopener\">Zipline<\/a>&nbsp;malware.<\/p>\n<p>Silk Typhoon&nbsp;has previously&nbsp;breached the&nbsp;systems of several U.S. government agencies, including&nbsp;<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/us-treasury-department-breached-through-remote-support-platform\/\" target=\"_blank\" rel=\"nofollow noopener\">the U.S. Treasury Department<\/a>,&nbsp;<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/chinese-hackers-targeted-sanctions-office-in-treasury-attack\/\" target=\"_blank\" rel=\"nofollow noopener\">the Office of Foreign Assets Control (OFAC)<\/a>, and&nbsp;<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/treasury-hackers-also-breached-us-foreign-investments-review-office\/\" target=\"_blank\" rel=\"nofollow noopener\">the Committee on Foreign Investment in the United States (CFIUS)<\/a>.<\/p>\n<h2>Feds&nbsp;ordered to prioritize CVE-2026-22769 patches<\/h2>\n<p>CISA has now&nbsp;<a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2026\/02\/18\/cisa-adds-two-known-exploited-vulnerabilities-catalog\" target=\"_blank\" rel=\"nofollow noopener\">added<\/a>&nbsp;the security flaw&nbsp;to its&nbsp;<a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-22769\" target=\"_blank\" rel=\"nofollow noopener\">Known Exploited Vulnerabilities (KEV) catalog<\/a>&nbsp;on Wednesday and ordered&nbsp;Federal Civilian Executive Branch (FCEB) agencies to secure their networks by the end of Saturday, February 21, as mandated by Binding Operational Directive (BOD) 22-01.<\/p>\n<p>&#8220;These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise,&#8221;&nbsp;<a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2026\/02\/18\/cisa-adds-two-known-exploited-vulnerabilities-catalog\" target=\"_blank\" rel=\"nofollow noopener\">CISA warned<\/a>&nbsp;on Wednesday.&nbsp;<\/p>\n<p>&#8220;Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.&#8221;<\/p>\n<p>Last week, CISA also gave U.S. federal&nbsp;agencies three days to&nbsp;<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisa-orders-feds-to-patch-beyondtrust-flaw-within-three-days\/\" target=\"_blank\" rel=\"nofollow noopener\">secure their BeyondTrust Remote Support instances<\/a>&nbsp;against an actively exploited remote code execution vulnerability (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/beyondtrust-warns-of-critical-rce-flaw-in-remote-support-software\/\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2026-1731<\/a>).<\/p>\n<p><span style=\"box-sizing:border-box; margin:0px; padding:0px\">Hacktron, which&nbsp;reported the vulnerability&nbsp;on January 31, <a href=\"https:\/\/www.hacktron.ai\/blog\/cve-2026-1731-beyondtrust-remote-support-rce\" target=\"_blank\" rel=\"nofollow noopener\">warned in early February<\/a> that around 11,000 BeyondTrust Remote Support instances were exposed online, and that around 8,500 were on-premises deployments that required manual patching.<\/span><\/p>\n<style> .ia_ad {     background-color: #f0f6ff;     width: 95%;     max-width: 800px;     margin: 15px auto;     border-radius: 8px;     border: 1px solid #d6ddee;     display: flex;     align-items: stretch;     padding: 0;     overflow: hidden; }  .ia_lef {     flex: 1;     max-width: 200px;     height: auto;     display: flex;     align-items: stretch; }  .ia_lef a {     display: flex;     width: 100%;     height: 100%; }   .ia_lef a img {     width: 100%;     height: 100%;          border-radius: 8px 0 0 8px;     margin: 0;     display: block; }  .ia_rig {     flex: 2;     padding: 10px;     display: flex;     flex-direction: column;     justify-content: center; }  .ia_rig h2 {     font-size: 17px !important;     font-weight: 700;     color: #333;     line-height: 1.4;     font-family: Georgia, \"Times New Roman\", Times, serif;     margin: 0 0 14px 0; }  .ia_rig p {     font-weight: bold;     font-size: 14px;     margin: 0 0 clamp(6px, 2vw, 14px) 0; }  .ia_button {     background-color: #FFF;     border: 1px solid #3b59aa;     color: black;     text-align: center;     text-decoration: none;     border-radius: 8px;     display: inline-block;     font-size: 16px;     font-weight: bold;     cursor: pointer;     padding: 10px 20px;     width: fit-content; }  .ia_button a {     text-decoration: none;     color: inherit;     display: block; }  @media (max-width: 600px) {     .ia_ad {         flex-direction: column;         align-items: center;     }      .ia_lef {         max-width: 100%;     }      .ia_lef a img {         border-radius: 8px 8px 0 0;     }       .ia_rig {         padding: 15px;         width: 100%;     }      .ia_button {         width: 100%; \tmargin: 0px auto;     } } <\/style>\n<div>\n<div>         <a href=\"https:\/\/www.tines.com\/access\/guide\/the-future-of-it-infrastructure\/?utm_source=BleepingComputer&#038;utm_medium=paid_media&#038;utm_content=ROS-inarticlebanner-0102\" target=\"_blank\" rel=\"noopener sponsored\">             <img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/t\/tines-in-art-square.jpg\" alt=\"CISA orders feds to patch actively exploited Dell flaw within 3 days\">         <\/a>     <\/div>\n<div>\n<h2><a href=\"https:\/\/www.tines.com\/access\/guide\/the-future-of-it-infrastructure\/?utm_source=BleepingComputer&#038;utm_medium=paid_media&#038;utm_content=ROS-inarticlebanner-0102\" target=\"_blank\" rel=\"noopener sponsored\">The future of IT infrastructure is here<\/a><\/h2>\n<p>Modern IT infrastructure moves faster than manual workflows can handle.<\/p>\n<p>In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.<\/p>\n<p>          <button><a href=\"https:\/\/www.tines.com\/access\/guide\/the-future-of-it-infrastructure\/?utm_source=BleepingComputer&#038;utm_medium=paid_media&#038;utm_content=ROS-inarticlebanner-0102\" target=\"_blank\" rel=\"noopener sponsored\">Get the guide<\/a><\/button>     <\/div>\n<\/p><\/div>\n<div>\n<h3>Related Articles:<\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/chinese-hackers-exploiting-dell-zero-day-flaw-since-mid-2024\/\">Chinese hackers exploiting Dell zero-day flaw since mid-2024<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisa-orders-feds-to-patch-beyondtrust-flaw-within-three-days\/\">CISA gives feds 3 days to patch actively exploited BeyondTrust flaw<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisa-flags-microsoft-configmgr-rce-flaw-as-exploited-in-attacks\/\">CISA flags critical Microsoft SCCM flaw as exploited in attacks<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisa-vmware-esxi-flaw-now-exploited-in-ransomware-attacks\/\">CISA: VMware ESXi flaw now exploited in ransomware attacks<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisa-warns-of-five-year-old-gitlab-flaw-exploited-in-attacks\/\">CISA warns of five-year-old GitLab flaw exploited in attacks<\/a><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The U.S. Cybersecurity and Infrastructure Security Agen [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-43792","post","type-post","status-publish","format-standard","hentry","category--bleepingcomputer"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43792","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=43792"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43792\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=43792"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=43792"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=43792"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}