Ilevia EVE X1 Server firmware versions ≤ 4.7.18.0.eden contain an insecure hashing algorithm vulnerability. The product stores passwords using the MD5 hash function without applying a per‑password salt. Because MD5 is a fast, unsalted hash, an attacker who obtains the password database can efficiently perform offline dictionary, rainbow‑table, or brute‑force attacks to recover the original passwords. Ilevia has declined to service this vulnerability, and recommends that customers not expose port 8080 to the internet.
History

Thu, 23 Oct 2025 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Ilevia eve X1 Server Firmware
CPEs cpe:2.3:h:ilevia:eve_x1_server:-:*:*:*:*:*:*:*
cpe:2.3:o:ilevia:eve_x1_server_firmware:*:*:*:*:*:*:*:*
Vendors & Products Ilevia eve X1 Server Firmware
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Mon, 20 Oct 2025 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Ilevia
Ilevia eve X1 Server
Vendors & Products Ilevia
Ilevia eve X1 Server

Thu, 16 Oct 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 16 Oct 2025 18:00:00 +0000

Type Values Removed Values Added
Description Ilevia EVE X1 Server firmware versions ≤ 4.7.18.0.eden contain an insecure hashing algorithm vulnerability. The product stores passwords using the MD5 hash function without applying a per‑password salt. Because MD5 is a fast, unsalted hash, an attacker who obtains the password database can efficiently perform offline dictionary, rainbow‑table, or brute‑force attacks to recover the original passwords. Ilevia has declined to service this vulnerability, and recommends that customers not expose port 8080 to the internet.
Title Ilevia EVE X1 Server 4.7.18.0.eden Insecure Hashing Algorithm
Weaknesses CWE-327
References
Metrics cvssV4_0

{'score': 8.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-10-16T17:55:50.634Z

Updated: 2025-10-16T19:15:11.887Z

Reserved: 2025-04-15T19:15:22.612Z

Link: CVE-2025-34519

cve-icon Vulnrichment

Updated: 2025-10-16T19:15:08.961Z

cve-icon NVD

Status : Analyzed

Published: 2025-10-16T18:15:36.493

Modified: 2025-10-23T20:13:23.303

Link: CVE-2025-34519

cve-icon Redhat

No data.