People Might Gain Rural Admin Access on Plug-In Systems Due to a SnapCenter weakness in NetApp SnapCenter.

April 27, 2025Ravie LakshmananVulnerability / Enterprise Security

In NetApp SnapCenter, a crucial security weakness has been discovered that, if exploited, could lead to pleasure escalation.

SnapCenter is an enterprise-focused program that enables data protection across storage, recover, and copy data resources and manages data protection across applications, databases, electronic machines, and file systems.

The risk, tracked as CVE-2025-26512, carries a CVSS report of 9.9 out of a maximum of 10.0.

In an advisory released this week, the data infrastructure provider stated that” SnapCenter variations due to 6.0.1P1 and 6.1P1 are exposed to a risk that could allow an authenticated SnapCenter Server person to become an admin user on a remote system where a SnapCenter plug-in has been installed.”

CVE-2025-26512 has been addressed in SnapCenter variants 6.0.1P1 and 6.1P1. There are presently no alternatives to the problem.

It’s crucial that businesses use the most recent upgrades to protect against potential threats, even though there is no proof that the flaw has been exploited in the wild.

I found this article to be intriguing. Follow us on and Twitter to access more unique content we article.

DNS checker

Leave a Comment