【資安漏洞預警】Dell RecoverPoint for Virtual Machines存在高風險安全漏洞(CVE-2026-22769),請儘速確認並進行修補
[Security Vulnerability Alert] Dell RecoverPoint for Virtual Machines contains a high-risk security vulnerability (CVE-2026-22769). Please confirm and patch it as soon as possible.

發布單位:圖資處數位服務組
日期範圍:2026/2/25 ~ 2026/9/25
 
發布單位:圖資處數位服務組
日期範圍:2026/2/25 ~ 2026/9/25
行政 行政公告
全體

轉發 國家資安資訊分享與分析中心 資安訊息警訊 NISAC-200-202602-00000093

[內容說明]
研究人員發現Dell RecoverPoint for Virtual Machines存在使用硬刻之帳號通行碼(Use of Hard-coded Credentials)漏洞(CVE-2026-22769),未經身分鑑別之遠端攻擊者可使用硬刻之帳號通行碼取得底層作業系統之root權限。
該漏洞已遭駭客利用,請儘速確認並進行修補。

[影響平台]
RecoverPoint for Virtual Machines 5.3 SP4 P1(含)以前版本、6.0、6.0 SP1、6.0 SP1 P1、6.0 SP1 P2、6.0 SP2、6.0 SP2 P1、6.0 SP3及6.0 SP3 P1版本

[建議措施]
官方已針對漏洞釋出修復更新,請參考官方說明進行更新,網址如下: https://www.dell.com/support/kbdoc/zh-tw/000426773/dsa-2026-079

[參考資料]
1. https://nvd.nist.gov/vuln/detail/CVE-2026-22769
2. https://www.dell.com/support/kbdoc/zh-tw/000426773/dsa-2026-079

Forwarded from National Cybersecurity Information Sharing and Analysis Center: Cybersecurity Alert NISAC-200-202602-00000093

[Content Description]
Researchers have discovered a vulnerability (CVE-2026-22769) in Dell RecoverPoint for Virtual Machines that allows the use of hard-coded credentials. An unauthenticated remote attacker could use a hard-coded credentials to gain root access to the underlying operating system.

This vulnerability has already been exploited by hackers. Please confirm and patch it as soon as possible.

[Affected Platforms]
RecoverPoint for Virtual Machines versions 5.3 SP4 P1 and earlier, 6.0, 6.0 SP1, 6.0 SP1 P1, 6.0 SP1 P2, 6.0 SP2, 6.0 SP2 P1, 6.0 SP3, and 6.0 SP3 P1.

[Recommended Actions]
An official patch has been released to fix the vulnerability. Please refer to the official instructions for updating. The URL is as follows: https://www.dell.com/support/kbdoc/zh-tw/000426773/dsa-2026-079

[References]
1. https://nvd.nist.gov/vuln/detail/CVE-2026-22769
2. https://www.dell.com/support/kbdoc/zh-tw/000426773/dsa-2026-079


相關附件
Top↑