CVE-2025-59693

The Chassis Management Board in Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allows a physically proximate attacker to obtain debug access and escalate privileges by bypassing the tamper label and opening the chassis without leaving evidence, and accessing the JTAG connector. This is called F02.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:entrust:nshield_5c_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:entrust:nshield_5c_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:entrust:nshield_5c:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:o:entrust:nshield_hsmi_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:entrust:nshield_hsmi_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:entrust:nshield_hsmi:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
OR cpe:2.3:o:entrust:nshield_connect_xc_base_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:entrust:nshield_connect_xc_base_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:entrust:nshield_connect_xc_base:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
OR cpe:2.3:o:entrust:nshield_connect_xc_mid_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:entrust:nshield_connect_xc_mid_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:entrust:nshield_connect_xc_mid:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
OR cpe:2.3:o:entrust:nshield_connect_xc_high_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:entrust:nshield_connect_xc_high_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:entrust:nshield_connect_xc_high:-:*:*:*:*:*:*:*

History

15 Dec 2025, 13:41

Type Values Removed Values Added
CPE cpe:2.3:o:entrust:nshield_connect_xc_mid_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:entrust:nshield_connect_xc_high:-:*:*:*:*:*:*:*
cpe:2.3:h:entrust:nshield_connect_xc_mid:-:*:*:*:*:*:*:*
cpe:2.3:h:entrust:nshield_5c:-:*:*:*:*:*:*:*
cpe:2.3:h:entrust:nshield_hsmi:-:*:*:*:*:*:*:*
cpe:2.3:o:entrust:nshield_hsmi_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:entrust:nshield_5c_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:entrust:nshield_connect_xc_base:-:*:*:*:*:*:*:*
cpe:2.3:o:entrust:nshield_connect_xc_base_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:entrust:nshield_connect_xc_high_firmware:*:*:*:*:*:*:*:*
References () https://github.com/google/security-research/security/advisories/GHSA-6q4x-m86j-gfwj - () https://github.com/google/security-research/security/advisories/GHSA-6q4x-m86j-gfwj - Exploit, Third Party Advisory
References () https://www.entrust.com/use-case/why-use-an-hsm - () https://www.entrust.com/use-case/why-use-an-hsm - Product
First Time Entrust nshield Hsmi
Entrust nshield 5c
Entrust nshield Connect Xc Base Firmware
Entrust
Entrust nshield Connect Xc Mid Firmware
Entrust nshield 5c Firmware
Entrust nshield Connect Xc Mid
Entrust nshield Connect Xc High
Entrust nshield Connect Xc High Firmware
Entrust nshield Hsmi Firmware
Entrust nshield Connect Xc Base

03 Dec 2025, 15:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CWE CWE-269

02 Dec 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-02 15:15

Updated : 2025-12-15 13:41


NVD link : CVE-2025-59693

Mitre link : CVE-2025-59693

CVE.ORG link : CVE-2025-59693


JSON object : View

Products Affected

entrust

  • nshield_hsmi_firmware
  • nshield_5c
  • nshield_connect_xc_mid
  • nshield_5c_firmware
  • nshield_connect_xc_high_firmware
  • nshield_connect_xc_mid_firmware
  • nshield_connect_xc_base
  • nshield_hsmi
  • nshield_connect_xc_base_firmware
  • nshield_connect_xc_high
CWE
CWE-269

Improper Privilege Management