CVE-2025-59699
BaseFortify
Publication date: 2025-12-02
Last updated on: 2025-12-08
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| entrust | nshield_5c_firmware | From 13.7 (inc) to 13.9.0 (inc) |
| entrust | nshield_5c_firmware | From 13.7 (inc) to 13.9.0 (inc) |
| entrust | nshield_5c | * |
| entrust | nshield_hsmi | * |
| entrust | nshield_connect_xc_base | * |
| entrust | nshield_connect_xc_mid_firmware | From 13.7 (inc) to 13.9.0 (inc) |
| entrust | nshield_connect_xc_mid | * |
| entrust | nshield_connect_xc_high_firmware | From 13.7 (inc) to 13.9.0 (inc) |
| entrust | nshield_connect_xc_high_firmware | From 13.7 (inc) to 13.9.0 (inc) |
| entrust | nshield_connect_xc_high | * |
| entrust | nshield_hsmi_firmware | From 13.7 (inc) to 13.9.0 (inc) |
| entrust | nshield_connect_xc_base_firmware | From 13.7 (inc) to 13.9.0 (inc) |
| entrust | nshield_hsmi_firmware | From 13.7 (inc) to 13.9.0 (inc) |
| entrust | nshield_connect_xc_base_firmware | From 13.7 (inc) to 13.9.0 (inc) |
| entrust | nshield_connect_xc_mid_firmware | From 13.7 (inc) to 13.9.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-290 | This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability affects Entrust nShield Connect XC, nShield 5c, and nShield HSMi devices up to versions 13.6.11 and 13.7. It allows an attacker who is physically close to the device to escalate their privileges by booting the device from a USB device that contains a valid root filesystem. The root cause is insecure default settings in the Legacy GRUB Bootloader, which permits this unauthorized boot process.
How can this vulnerability impact me? :
An attacker with physical access to the affected devices can gain elevated privileges by booting from a malicious USB device. This could lead to unauthorized control over the device, potentially compromising sensitive cryptographic operations or data protected by the Entrust nShield hardware security modules.