CVE-2025-59694

medium

Description

The Chassis Management Board in Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allows a physically proximate attacker to persistently modify firmware and influence the (insecurely configured) appliance boot process. To exploit this, the attacker must modify the firmware via JTAG or perform an upgrade to the chassis management board firmware. This is called F03.

References

https://www.entrust.com/use-case/why-use-an-hsm

https://github.com/google/security-research/security/advisories/GHSA-6q4x-m86j-gfwj

Details

Source: Mitre, NVD

Published: 2025-12-02

Updated: 2025-12-03

Risk Information

CVSS v2

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 6.8

Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Medium

EPSS

EPSS: 0.00018