CVE-2025-59700
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-02

Last updated on: 2025-12-08

Assigner: MITRE

Description
Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allow a physically proximate attacker with root access to modify the Recovery Partition (because of a lack of integrity protection).
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-02
Last Modified
2025-12-08
Generated
2026-05-07
AI Q&A
2025-12-02
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 15 associated CPEs
Vendor Product Version / Range
entrust nshield_5c *
entrust nshield_hsmi *
entrust nshield_connect_xc_base_firmware From 13.7 (inc) to 13.9.0 (inc)
entrust nshield_connect_xc_base_firmware From 13.7 (inc) to 13.9.0 (inc)
entrust nshield_connect_xc_base *
entrust nshield_connect_xc_mid_firmware From 13.7 (inc) to 13.9.0 (inc)
entrust nshield_connect_xc_mid_firmware From 13.7 (inc) to 13.9.0 (inc)
entrust nshield_connect_xc_mid *
entrust nshield_connect_xc_high_firmware From 13.7 (inc) to 13.9.0 (inc)
entrust nshield_connect_xc_high_firmware From 13.7 (inc) to 13.9.0 (inc)
entrust nshield_connect_xc_high *
entrust nshield_hsmi_firmware From 13.7 (inc) to 13.9.0 (inc)
entrust nshield_5c_firmware From 13.7 (inc) to 13.9.0 (inc)
entrust nshield_5c_firmware From 13.7 (inc) to 13.9.0 (inc)
entrust nshield_hsmi_firmware From 13.7 (inc) to 13.9.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-345 The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability affects Entrust nShield Connect XC, nShield 5c, and nShield HSMi devices up to versions 13.6.11 and 13.7. It allows an attacker who has physical proximity and root access to modify the Recovery Partition because there is no integrity protection on that partition.


How can this vulnerability impact me? :

If exploited, this vulnerability could allow an attacker with physical and root access to alter the Recovery Partition, potentially compromising the device's recovery process and security, which may lead to unauthorized control or data compromise.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart