CVE-2025-59703
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-02

Last updated on: 2025-12-08

Assigner: MITRE

Description
Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allow a Physically Proximate Attacker to access the internal components of the appliance, without leaving tamper evidence. To exploit this, the attacker needs to remove the tamper label and all fixing screws from the device without damaging it. This is called an F14 attack.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-02
Last Modified
2025-12-08
Generated
2026-05-06
AI Q&A
2025-12-02
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 15 associated CPEs
Vendor Product Version / Range
entrust nshield_5c_firmware From 13.7 (inc) to 13.9.0 (inc)
entrust nshield_5c_firmware From 13.7 (inc) to 13.9.0 (inc)
entrust nshield_5c *
entrust nshield_hsmi_firmware From 13.7 (inc) to 13.9.0 (inc)
entrust nshield_hsmi *
entrust nshield_connect_xc_base_firmware From 13.7 (inc) to 13.9.0 (inc)
entrust nshield_connect_xc_base *
entrust nshield_connect_xc_mid_firmware From 13.7 (inc) to 13.9.0 (inc)
entrust nshield_connect_xc_mid_firmware From 13.7 (inc) to 13.9.0 (inc)
entrust nshield_connect_xc_mid *
entrust nshield_connect_xc_high_firmware From 13.7 (inc) to 13.9.0 (inc)
entrust nshield_connect_xc_high_firmware From 13.7 (inc) to 13.9.0 (inc)
entrust nshield_connect_xc_high *
entrust nshield_hsmi_firmware From 13.7 (inc) to 13.9.0 (inc)
entrust nshield_connect_xc_base_firmware From 13.7 (inc) to 13.9.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability affects Entrust nShield Connect XC, nShield 5c, and nShield HSMi devices up to versions 13.6.11 and 13.7. It allows a physically proximate attacker to access the internal components of the appliance without leaving tamper evidence. The attacker must remove the tamper label and all fixing screws without damaging the device, a method known as an F14 attack.


How can this vulnerability impact me? :

The vulnerability allows an attacker with physical proximity to the device to access its internal components without detection. This could lead to unauthorized access or manipulation of sensitive hardware components, potentially compromising the security and integrity of the device and any cryptographic operations it performs.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, ensure that physical access to the Entrust nShield Connect XC, nShield 5c, and nShield HSMi devices is strictly controlled and monitored. Regularly inspect the devices for any signs of tampering, such as removed tamper labels or missing screws. Implement physical security measures like secure enclosures or locked cabinets to prevent unauthorized physical access.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart