SnapCenter backup solution: Attackers can take over systems as admin

The developers have closed a critical vulnerability in SnapCenter. So far there have been no reports of attacks.

listen Print view

(Image: Artur Szczybylo/Shutterstock.com)

1 min. read

The SnapCenter backup software is vulnerable and attackers can gain admin rights by successfully exploiting a "critical" vulnerability.

In an article on the vulnerability (CVE-2025-26512), the developers state that they have repaired versions 6.0.1P1 and 6.1P1. All previous versions can be attacked.

Attackers must be authenticated on a SnapCenter server as a prerequisite for an attack. If this is the case, they can gain admin rights on a remote system with the SnapCenter plug-in installed. The developers are not currently explaining how such an attack could take place. It is also unknown how admins can recognize systems that have already been attacked.

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.