CVE-2025-66001

Severity
8.8HIGH
EPSS
0.0%
top 90.97%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 8

Description

NeuVector supports login authentication through OpenID Connect. However, the TLS verification (which verifies the remote server's authenticity and integrity) for OpenID Connect is not enforced by default. As a result this may expose the system to man-in-the-middle (MITM) attacks.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

CVEListV5suse/neuvector5.3.05.4.8
Gogithub.com/neuvector/neuvector5.3.05.4.8

🔴Vulnerability Details

4
CVEList
NeuVector OpenID Connect is vulnerable to man-in-the-middle (MITM)2026-01-08
OSV
NeuVector OpenID Connect is vulnerable to man-in-the-middle (MITM) in github.com/neuvector/neuvector2025-12-15
OSV
NeuVector OpenID Connect is vulnerable to man-in-the-middle (MITM)2025-12-12
GHSA
NeuVector OpenID Connect is vulnerable to man-in-the-middle (MITM)2025-12-12

🕵️Threat Intelligence

1
Wiz
CVE-2025-66001 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2025-66001 (HIGH CVSS 8.8) | NeuVector supports login authentica | cvebase.io