PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-34185 Ilevia CVE debrief

CVE-2025-34185 affects Ilevia EVE X1 Server and allows pre-authentication file disclosure through the db_log POST parameter. Because the issue is reachable remotely and requires no authentication, attackers may be able to retrieve arbitrary files from the server. The supplied advisory notes potential exposure of sensitive system information and credentials, making this a high-priority confidentiality risk for exposed installations.

Vendor
Ilevia
Product
EVE X1
CVSS
HIGH 7.5
CISA KEV
Not listed in stored evidence
Original CVE published
2026-02-05
Original CVE updated
2026-02-05
Advisory published
2026-02-05
Advisory updated
2026-02-05

Who should care

Organizations operating Ilevia EVE X1 Server, especially teams responsible for OT/ICS management, perimeter exposure review, credential hygiene, and firewall configuration. Asset owners should pay particular attention if the server is reachable over the network or if port 8080 is exposed.

Technical summary

The supplied CISA CSAF advisory states that Ilevia EVE X1 Server contains a pre-authentication file disclosure vulnerability via the db_log POST parameter. The CVSS vector provided is CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, which aligns with a network-reachable issue that primarily impacts confidentiality. The advisory indicates attackers can retrieve arbitrary files from the server, potentially exposing sensitive files, system information, and credentials. The corpus also includes vendor mitigation guidance to update to the newest Ilevia Manager, close port 8080 on devices and routers, use the secure option in the updated manager, change default passwords, review firewall configurations, monitor for unauthorized access attempts, and segment networks where possible.

Defensive priority

High. This is a remotely reachable, pre-authentication data exposure issue with high confidentiality impact and no required user interaction.

Recommended defensive actions

  • Update to the newest version of Ilevia Manager from the vendor’s download page.
  • Verify port 8080 is closed on all devices and routers.
  • Enable access only through the secure option provided in the updated Ilevia Manager.
  • Change all default passwords on active systems to strong, unique credentials.
  • Review firewall configurations to confirm internal protections are functioning and external exposure is minimized.
  • Monitor for unauthorized access attempts.
  • Apply network segmentation where possible to reduce attack surface.

Evidence notes

This debrief is based on the supplied CISA CSAF advisory for ICSA-26-036-04 / CVE-2025-34185 and its vendor remediation text. The advisory description explicitly states that the vulnerability is pre-authentication, triggered via the db_log POST parameter, and may allow arbitrary file retrieval. The supplied corpus also lists official references to the CVE record and CISA advisory.

Official resources

Publicly disclosed by CISA in the initial publication of ICSA-26-036-04 on 2026-02-05.