CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2025-26512

Critical Severity
SVRS
89/100

CVSSv3
9.9/10

EPSS
0.0004/1

CVE-2025-26512 allows authenticated users of NetApp SnapCenter to gain admin privileges on systems with SnapCenter plugins. With an SVRS of 89, this is a critical vulnerability requiring immediate attention. This elevation of privilege flaw affects SnapCenter versions before 6.0.1P1 and 6.1P1. Successful exploitation grants attackers full control over affected remote systems. This could lead to data breaches, system compromise, and significant operational disruption. Given its high SVRS, organizations using vulnerable SnapCenter versions should prioritize patching to mitigate this severe security risk. The fact that the vulnerability is tagged 'In The Wild' underlines the urgent need for organizations to patch, as attackers are actively exploiting this vulnerability.

In The Wild
CVSS:3.1
AV:N
AC:L
PR:L
UI:N
S:C
C:H
I:H
A:H
2025-03-24

2025-03-27

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

⚡ Weekly Recap: Chrome 0-Day, IngressNightmare, Solar Bugs, DNS Tactics, and More
Ajit Jasrotia2025-03-31
⚡ Weekly Recap: Chrome 0-Day, IngressNightmare, Solar Bugs, DNS Tactics, and More | Every week, someone somewhere slips up—and threat actors slip in. A misconfigured setting, an overlooked vulnerability, or a too-convenient cloud tool becomes the perfect entry point. But what happens when the hunters become the hunted? Or when old malware resurfaces with new tricks? Step behind the curtain with us this week as we explore breaches […] The post ⚡ Weekly Recap: Chrome 0-Day, IngressNightmare, Solar Bugs, DNS Tactics, and More
allhackernews.com
rss
forum
news
Tageszusammenfassung - 27.03.2025
CERT.at2025-03-27
Tageszusammenfassung - 27.03.2025 | End-of-Day report Timeframe: Mittwoch 26-03-2025 18:00 - Donnerstag 27-03-2025 18:00 Handler: Felician Fuchs Co-Handler: Michael Schlagenhaufer News Dozens of solar inverter flaws could be exploited to attack power grids Dozens of vulnerabilities in products from three leading makers of solar inverters, Sungrow, Growatt, and SMA, could be exploited to control devices or execute code remotely on the vendors cloud platform. <a href="https://www.bleepingcomputer.com/news/security/dozens-of-solar-inverter-flaws-could-be-exploited-to-attack-power-grids/
cert.at
rss
forum
news
NetApp SnapCenter Flaw Could Let Users Gain Remote Admin Access on Plug-In Systems
Ajit Jasrotia2025-03-27
NetApp SnapCenter Flaw Could Let Users Gain Remote Admin Access on Plug-In Systems | A critical security flaw has been disclosed in NetApp SnapCenter that, if successfully exploited, could allow privilege escalation. SnapCenter is an enterprise-focused software that&#8217;s used to manage data protection across applications, databases, virtual machines, and file systems, offering the ability to backup, restore, and clone data resources. The vulnerability, tracked as CVE-2025-26512, carries a CVSS [&#8230;] The post NetApp SnapCenter Flaw Could Let Users Gain
allhackernews.com
rss
forum
news
Critical NetApp SnapCenter Server Vulnerability Allows Attackers to Gain Admin Access
Divya2025-03-26
Critical NetApp SnapCenter Server Vulnerability Allows Attackers to Gain Admin Access | A critical vulnerability has been identified in NetApp&#8217;s SnapCenter Server, affecting versions before 6.0.1P1 and 6.1P1. This flaw allows an authenticated SnapCenter Server user to potentially escalate their privileges to admin on remote systems where SnapCenter plug-ins are installed. The vulnerability has been designated as CVE-2025-26512 and carries a Critical severity rating with a CVSS [&#8230;] The post Critical NetApp SnapCenter Server Vulnerability Allows Attackers to
gbhackers.com
rss
forum
news
CVE-2025-26512 | NetApp SnapCenter up to 6.0.1/6.1 privileges assignment (NTAP-20250324-0001)
vuldb.com2025-03-25
CVE-2025-26512 | NetApp SnapCenter up to 6.0.1/6.1 privileges assignment (NTAP-20250324-0001) | A vulnerability was found in NetApp SnapCenter up to 6.0.1/6.1. It has been classified as very critical. This affects an unknown part. The manipulation leads to incorrect privilege assignment. This vulnerability is uniquely identified as CVE-2025-26512. It is possible to initiate the attack remotely. There is no exploit available. It is recommended to
vuldb.com
rss
forum
news

Social Media

🚨 CVE-2025-26512 in NetApp SnapCenter ⚠️ Lets low-privileged users gain admin access 🔧 Affected: Versions &lt; 6.0.1P1 / 6.1P1 ✅ Update now ✅ Review permissions ✅ Monitor for threats #CyberSecurity #CVE202526512 #NetApp #PatchNow #InfoSec #VulnerabilityAlert #FerrumIT https://t.co/LVwaX2i4f5
1
0
0
CISA e NetApp: malware RESURGE e vulnerabilità critiche in SnapCenter Sicurezza Informatica, buffer overflow, cisa, Coreboot, CVE-2025-0282, CVE-2025-26512, escalation, Ivanti, malware, MAR, NetApp, RESURGE, SnapCenter, vulnerabilità https://t.co/eDJQzjAuYg https://t.co/Ci65OtBxB2
0
0
0
Critical vulnerability CVE-2025-26512 in NetApp SnapCenter allows remote admin access on plug-in systems. Update to versions 6.0.1P1 or 6.1P1 immediately. #CyberSecurity #NetApp #DataProtection https://t.co/XXXtJ8d3l2 https://t.co/teHLZ4Prfg
0
0
0
@empadron Esta semana, la noticia más relevante de ciberseguridad es el exploit de EncryptHub que usa una vulnerabilidad zero-day en Windows (CVE-2025-26633), afectando muchos sistemas con malware como Rhadamanthys. También destaca una falla en NetApp SnapCenter (CVE-2025-26512), que https://t.co/AAqlylIxaX
0
0
1
A critical security flaw (CVE-2025-26512) in NetApp's SnapCenter allows privilege escalation for authenticated users. Affected versions must be updated immediately. ⚠️ #NetApp #DataBreach #USA link: https://t.co/xbprBKNdHo https://t.co/wCLWLBnFW8
0
0
0
A critical vulnerability, CVE-2025-26512, in NetApp SnapCenter allows privilege escalation for authenticated users on versions before 6.0.1P1 and 6.1P1. CVSS score: 9.9. 🚨 #NetApp #SecurityFlaw #USA link: https://t.co/pFZBRvLqfi https://t.co/vmGJSa0LiZ
0
0
0
Yikes! 🚨 NetApp SnapCenter has a critical flaw (CVE-2025-26512, CVSS 9.9) letting users escalate to admin. Patch ASAP—versions 6.0.1P1 &amp; 6.1P1 fix it. No known exploits yet, but don’t risk it! #Cybersecurity #NetApp #Vulnerability #PatchNow #CyberThreat #DataProtection #ITSe...
0
0
0
A critical privilege escalation vulnerability (CVE-2025-26512) with a CVSS score of 9.9 affects NetApp SnapCenter versions &lt;6.0.1P1 &amp; &lt;6.1P1. Updates available via NetApp Support. 🛡️ #NetApp #DataSecurity #USA link: https://t.co/uoHzZODVdc https://t.co/AiNaBIXbIN
0
1
0
NetApp SnapCenter Users at Risk: CVSS 9.9 Privilege Escalation Alert The vulnerability, tracked as CVE-2025-26512 (CVSS 9.9), is a privilege escalation flaw. https://t.co/hB0bW98qWE
0
0
0
Warning: Critical incorrect privilege assessment in #NetApp #snapcenter #CVE-2025-26512 CVSS: 9.9. It can lead to privilege escalation and complete system compromise. @netapp recommends updating to version 6.1P1 #Patch #Patch #Patch https://t.co/XJreqEMOJu
0
0
0

Affected Software

No affected software found for this CVE

References

ReferenceLink
AF854A3A-2127-422B-91AE-364DA2661108https://security.netapp.com/advisory/ntap-20250324-0001/
[email protected]https://security.netapp.com/advisory/NTAP-20250324-0001

CWE Details

CWE IDCWE NameDescription
CWE-266Incorrect Privilege AssignmentA product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence