CVE-2025-66478
Dec. 3, 2025, 6:15 p.m.
Description
Product(s) Impacted
| Product | Versions |
|---|---|
| * |
|
Weaknesses
Common security weaknesses mapped to this vulnerability.
Tags
Timeline
Last Modified: Dec. 3, 2025, 6:15 p.m.
Status : Rejected
CVE has been marked as "**REJECT**" in the CVE List. These CVEs are stored in the NVD, but do not show up in search results.
More infoSource
Relations
Here is the list of observables linked to the vulnerability CVE-2025-66478 using threat intelligence.
- Exploit Public-Facing Application
- External Remote Services
- Web Shell
- Valid Accounts
- Account Discovery
- PowerShell
- Ingress Tool Transfer
- Service Execution
- Web Protocols
- Registry Run Keys / Startup Folder
- Command and Scripting Interpreter
- Data from Local System
- Exfiltration Over C2 Channel
- Symmetric Cryptography
- System Network Configuration Discovery
- Cloud Infrastructure Discovery
- Unsecured Credentials
- Clear Command History
- System Owner/User Discovery
- SSH
- Virtualization/Sandbox Evasion
- File and Directory Discovery
- Cloud Accounts
- Bootkit
- Non-Standard Port
- Scheduled Task/Job
- Systemd Service
- Timestomp
- Network Service Discovery
- System Binary Proxy Execution
- Domain Account
- Non-Application Layer Protocol
- Standard Encoding
- Process Injection
- Proxy
- Default Accounts
- Resource Hijacking
- Exploitation of Remote Services
- System Information Discovery
- Domains
- Deobfuscate/Decode Files or Information
- Cron
- Impair Defenses
- Process Discovery
- Masquerade Task or Service
- Bidirectional Communication
- Remote Services
- Steal Web Session Cookie
- Obfuscated Files or Information
- Unix Shell Configuration Modification
- Domain Accounts
- Permission Groups Discovery
- Kaiji
- ANGRYREBEL.LINUX
- HISONIC
- EtherRAT
- PeerBlight
- ZinFoq
- ShadowPad - S0596
- CowTunnel
- SNOWLIGHT
- VShell
- XMRig
- MINOCAT
- ShadowPad
- COMPOOD
Linked Attack Reports
*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.