CVE-2025-59701
BaseFortify
Publication date: 2025-12-02
Last updated on: 2025-12-08
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| entrust | nshield_connect_xc_high_firmware | From 13.7 (inc) to 13.9.0 (inc) |
| entrust | nshield_connect_xc_high | * |
| entrust | nshield_connect_xc_mid_firmware | From 13.7 (inc) to 13.9.0 (inc) |
| entrust | nshield_connect_xc_mid_firmware | From 13.7 (inc) to 13.9.0 (inc) |
| entrust | nshield_connect_xc_mid | * |
| entrust | nshield_connect_xc_base_firmware | From 13.7 (inc) to 13.9.0 (inc) |
| entrust | nshield_connect_xc_base | * |
| entrust | nshield_hsmi_firmware | From 13.7 (inc) to 13.9.0 (inc) |
| entrust | nshield_hsmi_firmware | From 13.7 (inc) to 13.9.0 (inc) |
| entrust | nshield_hsmi | * |
| entrust | nshield_5c_firmware | From 13.7 (inc) to 13.9.0 (inc) |
| entrust | nshield_5c | * |
| entrust | nshield_connect_xc_base_firmware | From 13.7 (inc) to 13.9.0 (inc) |
| entrust | nshield_connect_xc_high_firmware | From 13.7 (inc) to 13.9.0 (inc) |
| entrust | nshield_5c_firmware | From 13.7 (inc) to 13.9.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-312 | The product stores sensitive information in cleartext within a resource that might be accessible to another control sphere. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability affects Entrust nShield Connect XC, nShield 5c, and nShield HSMi devices up to versions 13.6.11 and 13.7. It allows an attacker who is physically close to the device and has elevated privileges to read and modify the contents of the Appliance SSD because the data stored on the SSD is not encrypted.
How can this vulnerability impact me? :
If exploited, this vulnerability could allow an attacker with physical access and elevated privileges to access sensitive data stored on the Appliance SSD and alter it. This could lead to data breaches, unauthorized data modification, and potentially compromise the security and integrity of the device and the data it protects.