CVE-2025-60739
Ilevia · Ilevia EVE X1 Server Firmware
A critical Cross-Site Request Forgery (CSRF) vulnerability has been identified in Ilevia EVE X1 Server Firmware.
Executive summary
A critical Cross-Site Request Forgery (CSRF) vulnerability has been identified in Ilevia EVE X1 Server Firmware. This flaw, rated 9.6 on the CVSS scale, allows a remote attacker to execute arbitrary code by tricking an authenticated administrator into visiting a malicious webpage. Successful exploitation could lead to a complete compromise of the affected server, posing a significant risk to data confidentiality, integrity, and availability.
Vulnerability
The vulnerability exists within the /bh_web_backend component of the Ilevia EVE X1 Server's web interface, which lacks adequate Cross-Site Request Forgery (CSRF) protections. An attacker can craft a malicious website or link that, when visited by a logged-in administrator, sends a forged request to the vulnerable endpoint on the server. Because the server cannot distinguish this forged request from a legitimate one, it processes the request with the administrator's privileges, leading to arbitrary code execution on the underlying system.
Business impact
This vulnerability is rated as critical with a CVSS score of 9.6, indicating a high likelihood of exploitation and severe potential impact. A successful attack would grant an adversary complete control over the affected Ilevia EVE X1 Server. This could result in the theft of sensitive data, disruption of critical services managed by the server, and the use of the compromised system as a pivot point to launch further attacks against the internal network. The potential consequences include significant financial loss, operational downtime, and severe reputational damage.
Remediation
Immediate Action:
- Immediately identify all vulnerable Ilevia EVE X1 Servers within the environment.
- Update the firmware on all affected devices to the latest version provided by the vendor, which addresses this vulnerability.
- After patching, review server access and system logs for any signs of compromise or unusual activity targeting the
/bh_web_backendcomponent.
Proactive Monitoring:
- Monitor web server logs for any unusual or unauthorized requests to the
/bh_web_backendendpoint. Pay close attention to requests originating from unexpected referrers. - Implement system-level monitoring to detect suspicious processes or outbound network connections originating from the Ilevia servers, which could indicate a successful compromise.
- Utilize network intrusion detection systems (NIDS) to alert on traffic patterns associated with known exploitation techniques.
Compensating Controls:
- If immediate patching is not feasible, restrict network access to the server's web management interface to a dedicated and trusted management network or specific IP addresses.
- Deploy a Web Application Firewall (WAF) with rules designed to inspect and block malicious requests targeting the vulnerable component.
- Ensure administrators log out of the management interface when their session is complete to minimize the time window for a CSRF attack.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the critical CVSS score of 9.6 and the risk of complete system compromise, this vulnerability represents a severe threat. It is strongly recommended that organizations immediately identify all affected Ilevia EVE X1 Servers and apply the vendor-provided firmware updates as a top priority. Although this CVE is not currently listed on the CISA KEV catalog, its severity warrants immediate attention. If patching is delayed, the compensating controls listed above should be implemented without delay to reduce the attack surface.