{"vulnerability": "CVE-2025-26512", "sightings": [{"uuid": "78b2a421-1531-4a0d-b394-b8ce5e78deb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26512", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3llpwyisii224", "content": "", "creation_timestamp": "2025-04-01T03:36:13.522777Z"}, {"uuid": "70fb5f3a-b95c-48b3-8866-0fca906b06e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26512", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3llola7yjjhm2", "content": "", "creation_timestamp": "2025-03-31T14:34:05.490048Z"}, {"uuid": "c2fa5533-dc10-490d-8fa5-9364b8b33c62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26512", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3llqgmh56kmk2", "content": "", "creation_timestamp": "2025-04-01T08:16:11.187344Z"}, {"uuid": "a1a06b70-2d4d-41b7-bd2e-b8a5e141e4db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26512", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3llgdfytk5322", "content": "", "creation_timestamp": "2025-03-28T07:53:51.673505Z"}, {"uuid": "e0904065-b766-46a4-8ec2-795838e5fd16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26512", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114219843195697793", "content": "", "creation_timestamp": "2025-03-24T22:48:14.740162Z"}, {"uuid": "615367e7-a75d-4310-b838-be24d4946e80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26512", "type": "seen", "source": "https://bsky.app/profile/nimblenerd.social/post/3lldqqkowxn2h", "content": "", "creation_timestamp": "2025-03-27T07:12:27.188136Z"}, {"uuid": "c868a221-3d4c-4cbf-b0b5-cff87de67e0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26512", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3llgmrnbhbhf2", "content": "", "creation_timestamp": "2025-03-28T10:39:37.236931Z"}, {"uuid": "da45aab4-b334-4254-a877-c5a7b765a538", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26512", "type": "seen", "source": "https://bsky.app/profile/nihonmatsu.bsky.social/post/3llh6a5niqc2m", "content": "", "creation_timestamp": "2025-03-28T15:51:47.923539Z"}, {"uuid": "29764dbf-e446-4a42-874c-41523ca9f5c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26512", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3ll5wkhj5n32v", "content": "", "creation_timestamp": "2025-03-24T23:40:25.726803Z"}, {"uuid": "86737c9c-ff27-4d7a-b4cf-9267c02a1082", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26512", "type": "seen", "source": "https://bsky.app/profile/eyalestrin.bsky.social/post/3llb45yo6vk2c", "content": "", "creation_timestamp": "2025-03-26T05:58:49.357876Z"}, {"uuid": "d01e1a46-1c2f-4c71-af45-539d02de14f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26512", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lldz42zjkqx2", "content": "", "creation_timestamp": "2025-03-27T09:51:20.008574Z"}, {"uuid": "bfe094df-6f7b-41e9-ad3a-40fd5ea7af94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26512", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3llgf5gil3ac2", "content": "", "creation_timestamp": "2025-03-28T08:24:46.403840Z"}, {"uuid": "1eee6723-1f69-4234-a7d7-3cfb62af208e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26512", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3llgiermx5lc2", "content": "", "creation_timestamp": "2025-03-28T09:21:22.380007Z"}, {"uuid": "8179a98e-06f3-459b-b403-616331b59223", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26512", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3llqiv224st62", "content": "", "creation_timestamp": "2025-04-01T08:56:38.022067Z"}, {"uuid": "ded1fb22-70f4-4fcf-8a07-94418ce2273a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26512", "type": "seen", "source": "https://t.me/ton618cyber/8264", "content": "NetApp SnapCenter Flaw Could Let Users Gain Remote Admin Access on Plug-In Systems\n\nCVE-2025-26512 in NetApp SnapCenter scored 9.9 CVSS; patch required to prevent remote admin escalation.\n\nThe Hacker News | thehackernews.com \u2022 Mar 27, 2025", "creation_timestamp": "2025-03-28T16:21:03.000000Z"}, {"uuid": "a69e0a87-ddc4-432d-bab7-c8e6f0a3a752", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26512", "type": "seen", "source": "https://bsky.app/profile/matricedigitale.bsky.social/post/3lljvingkga2b", "content": "", "creation_timestamp": "2025-03-29T17:53:28.763522Z"}, {"uuid": "802de0ff-54cb-4c88-b70e-9073a30f332b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26512", "type": "seen", "source": "https://bsky.app/profile/matricedigitale.bsky.social/post/3lljvjf2vn32k", "content": "", "creation_timestamp": "2025-03-29T17:53:52.786272Z"}, {"uuid": "61918a86-b3d1-438a-8d2e-f1b3c040d101", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26512", "type": "seen", "source": "https://bsky.app/profile/matricedigitale.bsky.social/post/3lljvjmmhm62h", "content": "", "creation_timestamp": "2025-03-29T17:54:00.732242Z"}, {"uuid": "5f1c1555-d131-4113-934b-8cf5cd4af826", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26512", "type": "seen", "source": "MISP/f2f93f16-9318-44b1-9be3-2d3346ca540c", "content": "", "creation_timestamp": "2025-09-10T07:48:00.000000Z"}, {"uuid": "5e398426-b10e-42bd-b38c-9874a2d9e7a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26512", "type": "seen", "source": "MISP/f2f93f16-9318-44b1-9be3-2d3346ca540c", "content": "", "creation_timestamp": "2025-08-10T18:27:45.000000Z"}, {"uuid": "c13e8d5e-18f3-401a-861a-0c36601fefdc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26512", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8562", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26512\n\ud83d\udd25 CVSS Score: 9.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: SnapCenter versions prior to \n6.0.1P1 and 6.1P1 are susceptible to a vulnerability which may allow an \nauthenticated SnapCenter Server user to become an admin user on a remote\n system where a SnapCenter plug-in has been installed.\n\ud83d\udccf Published: 2025-03-24T22:06:00.720Z\n\ud83d\udccf Modified: 2025-03-24T22:06:00.720Z\n\ud83d\udd17 References:\n1. https://security.netapp.com/advisory/NTAP-20250324-0001", "creation_timestamp": "2025-03-24T22:23:43.000000Z"}, {"uuid": "59fb1cbf-e125-40ff-81fd-98ac966da020", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26512", "type": "seen", "source": "https://t.me/cvedetector/21003", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26512 - SnapCenter Plug-in Remote Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-26512 \nPublished : March 24, 2025, 10:15 p.m. | 1\u00a0hour, 7\u00a0minutes ago \nDescription : SnapCenter versions prior to   \n6.0.1P1 and 6.1P1 are susceptible to a vulnerability which may allow an   \nauthenticated SnapCenter Server user to become an admin user on a remote  \n system where a SnapCenter plug-in has been installed. \nSeverity: 9.9 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-25T01:05:36.000000Z"}, {"uuid": "aba75b46-b6ff-48db-afbb-49dcced2eb3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26512", "type": "seen", "source": "Telegram/AEYElqzpT6kJ3N_5w8jr_wcrIHhrL156XvD__XD5mf0nMzg", "content": "", "creation_timestamp": "2025-03-27T21:44:33.000000Z"}, {"uuid": "9fff7d25-515e-4130-bb71-4b71cbfdd4c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26512", "type": "seen", "source": "https://t.me/ton618cyber/3290", "content": "NetApp SnapCenter Flaw Could Let Users Gain Remote Admin Access on Plug-In Systems\n\nCVE-2025-26512 in NetApp SnapCenter scored 9.9 CVSS; patch required to prevent remote admin escalation.\n\nThe Hacker News | thehackernews.com \u2022 Mar 27, 2025", "creation_timestamp": "2025-03-28T16:21:04.000000Z"}, {"uuid": "94c6245b-790c-4683-8071-70d86a42f91e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26512", "type": "seen", "source": "https://t.me/thehackernews/6563", "content": "\ud83d\udea8 One click from insider to admin?\n\nA critical flaw in NetApp SnapCenter (CVE-2025-26512, CVSS 9.9) lets authenticated users escalate privileges to full admin\u2014on remote systems.\n\nSnapCenter powers enterprise backups\u2014this isn\u2019t niche, it\u2019s everywhere.\n\n\ud83d\udd17Read: https://thehackernews.com/2025/03/netapp-snapcenter-flaw-could-let-users.html", "creation_timestamp": "2025-03-27T07:09:36.000000Z"}]}