CVE-2025-59694
BaseFortify
Publication date: 2025-12-02
Last updated on: 2025-12-15
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| entrust | nshield_5c_firmware | to 13.6.12 (exc) |
| entrust | nshield_5c_firmware | From 13.7.3 (inc) to 13.9.0 (exc) |
| entrust | nshield_5c | * |
| entrust | nshield_hsmi_firmware | to 13.6.12 (exc) |
| entrust | nshield_hsmi_firmware | From 13.7.3 (inc) to 13.9.0 (exc) |
| entrust | nshield_hsmi | * |
| entrust | nshield_connect_xc_base_firmware | to 13.6.12 (exc) |
| entrust | nshield_connect_xc_base_firmware | From 13.7.3 (inc) to 13.9.0 (exc) |
| entrust | nshield_connect_xc_base | * |
| entrust | nshield_connect_xc_mid_firmware | to 13.6.12 (exc) |
| entrust | nshield_connect_xc_mid_firmware | From 13.7.3 (inc) to 13.9.0 (exc) |
| entrust | nshield_connect_xc_mid | * |
| entrust | nshield_connect_xc_high_firmware | to 13.6.12 (exc) |
| entrust | nshield_connect_xc_high_firmware | From 13.7.3 (inc) to 13.9.0 (exc) |
| entrust | nshield_connect_xc_high | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1274 | The product conducts a secure-boot process that transfers bootloader code from Non-Volatile Memory (NVM) into Volatile Memory (VM), but it does not have sufficient access control or other protections for the Volatile Memory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability affects the Chassis Management Board in Entrust nShield Connect XC, nShield 5c, and nShield HSMi devices up to versions 13.6.11 or 13.7. A physically proximate attacker can persistently modify the firmware by using JTAG or performing a firmware upgrade on the chassis management board. This allows the attacker to influence the appliance's boot process, which is insecurely configured.
How can this vulnerability impact me? :
An attacker with physical proximity can modify the firmware of the affected devices, potentially compromising the integrity of the appliance's boot process. This could lead to persistent unauthorized control or manipulation of the device, undermining its security and trustworthiness.