Cyber Posture

CVE-2025-26512

Critical

Published: 24 March 2025

Published
24 March 2025
Modified
16 January 2026
KEV Added
Patch
CVSS Score 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0007 21.6th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.

Security Summary

CVE-2025-26512 is a privilege escalation vulnerability affecting NetApp SnapCenter versions prior to 6.0.1P1 and 6.1P1. It enables an authenticated user on the SnapCenter Server to gain administrative privileges on a remote system where a SnapCenter plug-in is installed. The issue is associated with CWE-266 (Incorrect Privilege Assignment) and carries a CVSS v3.1 base score of 9.9 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H), classifying it as critical due to its network accessibility, low complexity, and high impacts across confidentiality, integrity, and availability.

An attacker requires only low-privilege authenticated access to the SnapCenter Server to exploit this vulnerability remotely without user interaction. Exploitation allows the attacker to elevate their privileges to administrator level on remote hosts running SnapCenter plug-ins, potentially enabling full control over those systems in a cross-scope attack.

NetApp security advisories (NTAP-20250324-0001), available at https://security.netapp.com/advisory/ntap-20250324-0001/ and https://security.netapp.com/advisory/NTAP-20250324-0001, detail mitigation steps, with upgrading to SnapCenter 6.0.1P1 or 6.1P1 resolving the issue in affected versions.

Details

CWE(s)
CWE-266NVD-CWE-noinfo

Affected Products

netapp
snapcenter
6.0.1, 6.1 · ≤ 6.0.1

MITRE ATT&CK Enterprise Techniques

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

The CVE explicitly describes a privilege escalation vulnerability (CWE-266) allowing an authenticated low-privilege user on the SnapCenter Server to gain administrative privileges on remote systems with SnapCenter plug-ins installed, directly enabling exploitation for privilege escalation.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References