Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60739: n/a

0
Critical
VulnerabilityCVE-2025-60739cvecve-2025-60739
Published: Tue Nov 25 2025 (11/25/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-60739 is a critical Cross Site Request Forgery (CSRF) vulnerability affecting Ilevia EVE X1 Server Firmware version 4. 7. 18. 0. eden and earlier, specifically targeting the /bh_web_backend component. This flaw allows remote attackers to execute arbitrary code without authentication but requires user interaction. The vulnerability impacts confidentiality, integrity, and availability, with a high CVSS score of 9. 6. Although no known exploits are reported in the wild yet, the vulnerability’s severity and ease of exploitation make it a significant risk. European organizations using this firmware in critical infrastructure or industrial environments are particularly at risk.

AI-Powered Analysis

AILast updated: 12/02/2025, 16:52:08 UTC

Technical Analysis

CVE-2025-60739 is a critical security vulnerability identified in the Ilevia EVE X1 Server Firmware version 4.7.18.0.eden and earlier, specifically within the /bh_web_backend component. The vulnerability is classified as a Cross Site Request Forgery (CSRF), which allows a remote attacker to trick an authenticated user into executing unintended commands on the vulnerable server. This can lead to arbitrary code execution, compromising the system’s confidentiality, integrity, and availability. The CVSS v3.1 score of 9.6 reflects the high severity, with an attack vector that is network-based (AV:N), requiring no privileges (PR:N), but user interaction (UI:R). The scope is changed (S:C), indicating that the attack can affect resources beyond the vulnerable component. The vulnerability also relates to CWE-352 (CSRF), CWE-200 (Information Exposure), and CWE-79 (Cross-site Scripting), suggesting that exploitation could lead to sensitive data leaks and script injection. Although no public exploits have been observed, the critical nature of this flaw, combined with the widespread use of Ilevia EVE X1 in industrial and infrastructure environments, underscores the urgency for remediation. The lack of available patches at the time of disclosure necessitates immediate risk mitigation through network controls and monitoring.

Potential Impact

For European organizations, the impact of CVE-2025-60739 is substantial, especially for those relying on Ilevia EVE X1 servers in industrial control systems, critical infrastructure, or enterprise environments. Successful exploitation could allow attackers to execute arbitrary code remotely, potentially leading to full system compromise, data breaches, operational disruption, and loss of control over critical processes. The vulnerability’s ability to affect confidentiality, integrity, and availability simultaneously means sensitive information could be exposed or manipulated, and systems could be rendered inoperative. Given the interconnected nature of European industrial and infrastructure networks, a successful attack could cascade, affecting supply chains and essential services. The requirement for user interaction somewhat limits automated exploitation but does not eliminate risk, as social engineering or phishing could facilitate attacks. The absence of known exploits currently provides a window for proactive defense, but the critical severity demands urgent attention to prevent future incidents.

Mitigation Recommendations

1. Immediate deployment of firmware updates or patches from Ilevia once available is paramount. 2. Until patches are released, implement strict network segmentation to isolate EVE X1 servers from general user networks and the internet. 3. Employ web application firewalls (WAFs) to monitor and block suspicious requests targeting the /bh_web_backend component. 4. Enhance user awareness and training to recognize and avoid phishing or social engineering attempts that could trigger CSRF attacks. 5. Restrict administrative access to the vulnerable devices to trusted networks and users only, using multi-factor authentication where possible. 6. Monitor logs and network traffic for unusual activity indicative of attempted exploitation, such as unexpected POST requests or anomalous user behavior. 7. Disable or limit unnecessary web interface functionalities that could be exploited. 8. Collaborate with vendors and cybersecurity communities to stay informed about patch releases and emerging threats related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6925d6df159f97fbc0f9aed9

Added to database: 11/25/2025, 4:18:39 PM

Last enriched: 12/2/2025, 4:52:08 PM

Last updated: 1/10/2026, 10:10:36 PM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats