Ilevia EVE X1 Server firmware versions ≤ 4.7.18.0.eden contain an insecure hashing algorithm vulnerability. The product stores passwords using the MD5 hash function without applying a per‑password salt. Because MD5 is a fast, unsalted hash, an attacker who obtains the password database can efficiently perform offline dictionary, rainbow‑table, or brute‑force attacks to recover the original passwords. Ilevia has declined to service this vulnerability, and recommends that customers not expose port 8080 to the internet.
Metrics
Affected Vendors & Products
References
History
Thu, 16 Oct 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 16 Oct 2025 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Ilevia EVE X1 Server firmware versions ≤ 4.7.18.0.eden contain an insecure hashing algorithm vulnerability. The product stores passwords using the MD5 hash function without applying a per‑password salt. Because MD5 is a fast, unsalted hash, an attacker who obtains the password database can efficiently perform offline dictionary, rainbow‑table, or brute‑force attacks to recover the original passwords. Ilevia has declined to service this vulnerability, and recommends that customers not expose port 8080 to the internet. | |
Title | Ilevia EVE X1 Server 4.7.18.0.eden Insecure Hashing Algorithm | |
Weaknesses | CWE-327 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-10-16T19:15:11.887Z
Reserved: 2025-04-15T19:15:22.612Z
Link: CVE-2025-34519

Updated: 2025-10-16T19:15:08.961Z

Status : Received
Published: 2025-10-16T18:15:36.493
Modified: 2025-10-16T18:15:36.493
Link: CVE-2025-34519

No data.

No data.