CVE-2025-59694
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-02

Last updated on: 2025-12-15

Assigner: MITRE

Description
The Chassis Management Board in Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allows a physically proximate attacker to persistently modify firmware and influence the (insecurely configured) appliance boot process. To exploit this, the attacker must modify the firmware via JTAG or perform an upgrade to the chassis management board firmware. This is called F03.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-02
Last Modified
2025-12-15
Generated
2026-05-07
AI Q&A
2025-12-02
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 15 associated CPEs
Vendor Product Version / Range
entrust nshield_5c_firmware to 13.6.12 (exc)
entrust nshield_5c_firmware From 13.7.3 (inc) to 13.9.0 (exc)
entrust nshield_5c *
entrust nshield_hsmi_firmware to 13.6.12 (exc)
entrust nshield_hsmi_firmware From 13.7.3 (inc) to 13.9.0 (exc)
entrust nshield_hsmi *
entrust nshield_connect_xc_base_firmware to 13.6.12 (exc)
entrust nshield_connect_xc_base_firmware From 13.7.3 (inc) to 13.9.0 (exc)
entrust nshield_connect_xc_base *
entrust nshield_connect_xc_mid_firmware to 13.6.12 (exc)
entrust nshield_connect_xc_mid_firmware From 13.7.3 (inc) to 13.9.0 (exc)
entrust nshield_connect_xc_mid *
entrust nshield_connect_xc_high_firmware to 13.6.12 (exc)
entrust nshield_connect_xc_high_firmware From 13.7.3 (inc) to 13.9.0 (exc)
entrust nshield_connect_xc_high *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-1274 The product conducts a secure-boot process that transfers bootloader code from Non-Volatile Memory (NVM) into Volatile Memory (VM), but it does not have sufficient access control or other protections for the Volatile Memory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability affects the Chassis Management Board in Entrust nShield Connect XC, nShield 5c, and nShield HSMi devices up to versions 13.6.11 or 13.7. A physically proximate attacker can persistently modify the firmware by using JTAG or performing a firmware upgrade on the chassis management board. This allows the attacker to influence the appliance's boot process, which is insecurely configured.


How can this vulnerability impact me? :

An attacker with physical proximity can modify the firmware of the affected devices, potentially compromising the integrity of the appliance's boot process. This could lead to persistent unauthorized control or manipulation of the device, undermining its security and trustworthiness.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart