CVE-2025-59694

The Chassis Management Board in Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allows a physically proximate attacker to persistently modify firmware and influence the (insecurely configured) appliance boot process. To exploit this, the attacker must modify the firmware via JTAG or perform an upgrade to the chassis management board firmware. This is called F03.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:entrust:nshield_5c_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:entrust:nshield_5c_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:entrust:nshield_5c:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:o:entrust:nshield_hsmi_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:entrust:nshield_hsmi_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:entrust:nshield_hsmi:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
OR cpe:2.3:o:entrust:nshield_connect_xc_base_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:entrust:nshield_connect_xc_base_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:entrust:nshield_connect_xc_base:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
OR cpe:2.3:o:entrust:nshield_connect_xc_mid_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:entrust:nshield_connect_xc_mid_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:entrust:nshield_connect_xc_mid:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
OR cpe:2.3:o:entrust:nshield_connect_xc_high_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:entrust:nshield_connect_xc_high_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:entrust:nshield_connect_xc_high:-:*:*:*:*:*:*:*

History

15 Dec 2025, 13:39

Type Values Removed Values Added
First Time Entrust nshield Hsmi
Entrust nshield 5c
Entrust nshield Connect Xc Base Firmware
Entrust
Entrust nshield Connect Xc Mid Firmware
Entrust nshield 5c Firmware
Entrust nshield Connect Xc Mid
Entrust nshield Connect Xc High
Entrust nshield Connect Xc High Firmware
Entrust nshield Hsmi Firmware
Entrust nshield Connect Xc Base
References () https://github.com/google/security-research/security/advisories/GHSA-6q4x-m86j-gfwj - () https://github.com/google/security-research/security/advisories/GHSA-6q4x-m86j-gfwj - Exploit, Third Party Advisory
References () https://www.entrust.com/use-case/why-use-an-hsm - () https://www.entrust.com/use-case/why-use-an-hsm - Product
CPE cpe:2.3:o:entrust:nshield_connect_xc_mid_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:entrust:nshield_connect_xc_high:-:*:*:*:*:*:*:*
cpe:2.3:h:entrust:nshield_connect_xc_mid:-:*:*:*:*:*:*:*
cpe:2.3:h:entrust:nshield_5c:-:*:*:*:*:*:*:*
cpe:2.3:h:entrust:nshield_hsmi:-:*:*:*:*:*:*:*
cpe:2.3:o:entrust:nshield_hsmi_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:entrust:nshield_5c_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:entrust:nshield_connect_xc_base:-:*:*:*:*:*:*:*
cpe:2.3:o:entrust:nshield_connect_xc_base_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:entrust:nshield_connect_xc_high_firmware:*:*:*:*:*:*:*:*

03 Dec 2025, 16:15

Type Values Removed Values Added
References () https://github.com/google/security-research/security/advisories/GHSA-6q4x-m86j-gfwj - () https://github.com/google/security-research/security/advisories/GHSA-6q4x-m86j-gfwj -
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.8
CWE CWE-1274

02 Dec 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-02 15:15

Updated : 2025-12-15 13:39


NVD link : CVE-2025-59694

Mitre link : CVE-2025-59694

CVE.ORG link : CVE-2025-59694


JSON object : View

Products Affected

entrust

  • nshield_hsmi_firmware
  • nshield_5c
  • nshield_connect_xc_mid
  • nshield_5c_firmware
  • nshield_connect_xc_high_firmware
  • nshield_connect_xc_mid_firmware
  • nshield_connect_xc_base
  • nshield_hsmi
  • nshield_connect_xc_base_firmware
  • nshield_connect_xc_high
CWE
CWE-1274

Improper Access Control for Volatile Memory Containing Boot Code