Bg Shape
Image

Critical Flaws in Dell, Chrome and Copilot

Robert Kehoe
Chief Technology Officer
Published:
February 20, 2026

This week’s Risk Radar focuses on two critical vulnerabilities affecting widely deployed enterprise and consumer technologies, alongside an AI control failure that underscores the operational realities of platform dependency.

The common thread is exposure through embedded trust. Hard-coded access, widely used browsers, and AI assistants integrated into productivity environments all sit deep within operational workflows. When weaknesses emerge in these layers, response time matters.

Critical Vulnerability: Dell EMC Recovery Point

CISA has issued an unusually urgent directive regarding a critical vulnerability in Dell EMC’s Recovery Point software. The issue centres on hard-coded administrative credentials within the product, creating the potential for privileged access if exploited.

CISA has mandated remediation within three days for affected federal systems, reflecting both the severity of the vulnerability and the risk profile associated with backup and recovery infrastructure. Systems designed to protect resilience should not become an entry point for compromise.

What this means in practice:
Organisations using Recovery Point should prioritise patching immediately. Beyond remediation, this is a reminder to assess where privileged access mechanisms exist within core infrastructure tools. Backup and recovery platforms often hold elevated permissions across environments. Any weakness in those systems carries disproportionate risk. Asset inventories must clearly identify where such tools operate and ensure they are included in accelerated patching workflows.

Zero-Day Exploitation: Google Chrome

Google has released an out-of-band emergency patch for a critical zero-day vulnerability in the Chrome browser. The flaw has been observed in the wild. While technical specifics remain limited, the fact that the fix was back-ported across multiple versions and platforms, including Windows, macOS, and Linux, signals material severity.

Browsers are effectively part of the enterprise attack surface. They mediate access to SaaS platforms, cloud environments, and internal applications. A browser-level exploit can become a direct path into user sessions and corporate data.

What this means in practice:
Ensure Chrome updates are being deployed without delay across managed devices. Where automatic updates are not centrally enforced, that gap needs addressing. Zero-days reduce response windows. Patch latency becomes exposure. Organisations should also validate that endpoint detection and monitoring controls are tuned to detect anomalous browser behaviour, particularly during periods of active exploitation.

AI Control Bypass: Microsoft Copilot and DLP

Microsoft confirmed and resolved an issue where Copilot was able to access and summarise confidential email content despite Data Loss Prevention policies that should have restricted such access.

The issue has been addressed, but it highlights a structural reality. When AI services are tightly integrated into productivity ecosystems, they operate with broad contextual access. Control enforcement is only as strong as the underlying implementation.

What this means in practice:
CISOs should revisit assumptions around AI guardrails. Technical controls can fail. When the platform provider owns both the problem and the fix, customer influence is limited. Incident response plans must account for scenarios where exposure originates from third-party service logic rather than internal misconfiguration. Communication pathways, legal review processes, and executive escalation procedures should be validated against this type of event.

This is also a prompt to reassess AI governance frameworks. Visibility into how AI tools access, process, and store sensitive information is not optional. It is foundational.

Closing Perspective

None of these issues are theoretical. A hard-coded administrative pathway in a resilience platform. A zero-day in the world’s most widely used browser. An AI assistant bypassing policy controls within a trusted ecosystem.

Each reflects embedded dependency. Core tools are deeply integrated into daily operations. When they fail, the blast radius is immediate.

The priority remains operational discipline. Patch with urgency. Verify control effectiveness. Test response plans against vendor-originated failures. Dependency does not remove accountability. It simply shifts where resilience must be proven.

The fundamentals have not changed. Execution speed and verification matter more than ever.

Read Our Latest Blogs

Blog Image
Iran Cyber Activity Focuses on Industrial Systems and Data Leaks

Iran-linked cyber activity targets industrial systems, data leaks, and human vulnerabilities, with risk centred on access, exposure, and operational control

Blog Image
North Korean Supply Chain Attacks, Chrome Zero-Day Exploit, and Qilin EDR Bypass

An in-depth look at major cybersecurity threats including North Korean supply chain compromises, a critical Chrome zero-day exploit, and Qilin ransomware

Blog Image
Claude Mythos: What Security Leaders Should Take Away

AI models like Claude Mythos are accelerating vulnerability discovery and exploitation, compressing attack timelines and increasing pressure on defenders.

Bg ShapeBg Shape
BLOGS & INSIGHTS

Critical Flaws in Dell, Chrome and Copilot

Cybersecurity Insights
Robert Kehoe
Chief Technology Officer
February 20, 2026

This week’s Risk Radar focuses on two critical vulnerabilities affecting widely deployed enterprise and consumer technologies, alongside an AI control failure that underscores the operational realities of platform dependency.

The common thread is exposure through embedded trust. Hard-coded access, widely used browsers, and AI assistants integrated into productivity environments all sit deep within operational workflows. When weaknesses emerge in these layers, response time matters.

Critical Vulnerability: Dell EMC Recovery Point

CISA has issued an unusually urgent directive regarding a critical vulnerability in Dell EMC’s Recovery Point software. The issue centres on hard-coded administrative credentials within the product, creating the potential for privileged access if exploited.

CISA has mandated remediation within three days for affected federal systems, reflecting both the severity of the vulnerability and the risk profile associated with backup and recovery infrastructure. Systems designed to protect resilience should not become an entry point for compromise.

What this means in practice:
Organisations using Recovery Point should prioritise patching immediately. Beyond remediation, this is a reminder to assess where privileged access mechanisms exist within core infrastructure tools. Backup and recovery platforms often hold elevated permissions across environments. Any weakness in those systems carries disproportionate risk. Asset inventories must clearly identify where such tools operate and ensure they are included in accelerated patching workflows.

Zero-Day Exploitation: Google Chrome

Google has released an out-of-band emergency patch for a critical zero-day vulnerability in the Chrome browser. The flaw has been observed in the wild. While technical specifics remain limited, the fact that the fix was back-ported across multiple versions and platforms, including Windows, macOS, and Linux, signals material severity.

Browsers are effectively part of the enterprise attack surface. They mediate access to SaaS platforms, cloud environments, and internal applications. A browser-level exploit can become a direct path into user sessions and corporate data.

What this means in practice:
Ensure Chrome updates are being deployed without delay across managed devices. Where automatic updates are not centrally enforced, that gap needs addressing. Zero-days reduce response windows. Patch latency becomes exposure. Organisations should also validate that endpoint detection and monitoring controls are tuned to detect anomalous browser behaviour, particularly during periods of active exploitation.

AI Control Bypass: Microsoft Copilot and DLP

Microsoft confirmed and resolved an issue where Copilot was able to access and summarise confidential email content despite Data Loss Prevention policies that should have restricted such access.

The issue has been addressed, but it highlights a structural reality. When AI services are tightly integrated into productivity ecosystems, they operate with broad contextual access. Control enforcement is only as strong as the underlying implementation.

What this means in practice:
CISOs should revisit assumptions around AI guardrails. Technical controls can fail. When the platform provider owns both the problem and the fix, customer influence is limited. Incident response plans must account for scenarios where exposure originates from third-party service logic rather than internal misconfiguration. Communication pathways, legal review processes, and executive escalation procedures should be validated against this type of event.

This is also a prompt to reassess AI governance frameworks. Visibility into how AI tools access, process, and store sensitive information is not optional. It is foundational.

Closing Perspective

None of these issues are theoretical. A hard-coded administrative pathway in a resilience platform. A zero-day in the world’s most widely used browser. An AI assistant bypassing policy controls within a trusted ecosystem.

Each reflects embedded dependency. Core tools are deeply integrated into daily operations. When they fail, the blast radius is immediate.

The priority remains operational discipline. Patch with urgency. Verify control effectiveness. Test response plans against vendor-originated failures. Dependency does not remove accountability. It simply shifts where resilience must be proven.

The fundamentals have not changed. Execution speed and verification matter more than ever.

Robert Kehoe

Chief Technology Officer

Robert is CTO at Smarttech247, leading engineering strategy and delivery across cybersecurity products and services. With over 15 years’ experience in software and security, and CISSP certified, he has led large-scale cloud and security initiatives, including Cloud Protection for Salesforce. Robert focuses on measurable customer outcomes and building empowered, high-performing engineering teams.

Contents:

Ready to scale your security and compliance operations?

We protect your on-premise/cloud/OT environments - 24x7x365