CVE-2025-59703
BaseFortify
Publication date: 2025-12-02
Last updated on: 2025-12-08
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| entrust | nshield_5c_firmware | From 13.7 (inc) to 13.9.0 (inc) |
| entrust | nshield_5c_firmware | From 13.7 (inc) to 13.9.0 (inc) |
| entrust | nshield_5c | * |
| entrust | nshield_hsmi_firmware | From 13.7 (inc) to 13.9.0 (inc) |
| entrust | nshield_hsmi | * |
| entrust | nshield_connect_xc_base_firmware | From 13.7 (inc) to 13.9.0 (inc) |
| entrust | nshield_connect_xc_base | * |
| entrust | nshield_connect_xc_mid_firmware | From 13.7 (inc) to 13.9.0 (inc) |
| entrust | nshield_connect_xc_mid_firmware | From 13.7 (inc) to 13.9.0 (inc) |
| entrust | nshield_connect_xc_mid | * |
| entrust | nshield_connect_xc_high_firmware | From 13.7 (inc) to 13.9.0 (inc) |
| entrust | nshield_connect_xc_high_firmware | From 13.7 (inc) to 13.9.0 (inc) |
| entrust | nshield_connect_xc_high | * |
| entrust | nshield_hsmi_firmware | From 13.7 (inc) to 13.9.0 (inc) |
| entrust | nshield_connect_xc_base_firmware | From 13.7 (inc) to 13.9.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability affects Entrust nShield Connect XC, nShield 5c, and nShield HSMi devices up to versions 13.6.11 and 13.7. It allows a physically proximate attacker to access the internal components of the appliance without leaving tamper evidence. The attacker must remove the tamper label and all fixing screws without damaging the device, a method known as an F14 attack.
How can this vulnerability impact me? :
The vulnerability allows an attacker with physical proximity to the device to access its internal components without detection. This could lead to unauthorized access or manipulation of sensitive hardware components, potentially compromising the security and integrity of the device and any cryptographic operations it performs.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, ensure that physical access to the Entrust nShield Connect XC, nShield 5c, and nShield HSMi devices is strictly controlled and monitored. Regularly inspect the devices for any signs of tampering, such as removed tamper labels or missing screws. Implement physical security measures like secure enclosures or locked cabinets to prevent unauthorized physical access.