CVE-2025-59697

Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allow a physically proximate attacker to escalate privileges by editing the Legacy GRUB bootloader configuration to start a root shell upon boot of the host OS. This is called F06.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:entrust:nshield_5c_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:entrust:nshield_5c_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:entrust:nshield_5c:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:o:entrust:nshield_hsmi_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:entrust:nshield_hsmi_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:entrust:nshield_hsmi:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
OR cpe:2.3:o:entrust:nshield_connect_xc_base_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:entrust:nshield_connect_xc_base_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:entrust:nshield_connect_xc_base:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
OR cpe:2.3:o:entrust:nshield_connect_xc_mid_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:entrust:nshield_connect_xc_mid_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:entrust:nshield_connect_xc_mid:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
OR cpe:2.3:o:entrust:nshield_connect_xc_high_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:entrust:nshield_connect_xc_high_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:entrust:nshield_connect_xc_high:-:*:*:*:*:*:*:*

History

08 Dec 2025, 19:06

Type Values Removed Values Added
CPE cpe:2.3:o:entrust:nshield_connect_xc_mid_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:entrust:nshield_connect_xc_high:-:*:*:*:*:*:*:*
cpe:2.3:h:entrust:nshield_connect_xc_mid:-:*:*:*:*:*:*:*
cpe:2.3:h:entrust:nshield_5c:-:*:*:*:*:*:*:*
cpe:2.3:h:entrust:nshield_hsmi:-:*:*:*:*:*:*:*
cpe:2.3:o:entrust:nshield_hsmi_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:entrust:nshield_5c_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:entrust:nshield_connect_xc_base:-:*:*:*:*:*:*:*
cpe:2.3:o:entrust:nshield_connect_xc_base_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:entrust:nshield_connect_xc_high_firmware:*:*:*:*:*:*:*:*
References () https://github.com/google/security-research/security/advisories/GHSA-6q4x-m86j-gfwj - () https://github.com/google/security-research/security/advisories/GHSA-6q4x-m86j-gfwj - Exploit, Third Party Advisory
References () https://www.entrust.com/use-case/why-use-an-hsm - () https://www.entrust.com/use-case/why-use-an-hsm - Product
First Time Entrust nshield Hsmi
Entrust nshield 5c
Entrust nshield Connect Xc Base Firmware
Entrust
Entrust nshield Connect Xc Mid Firmware
Entrust nshield 5c Firmware
Entrust nshield Connect Xc Mid
Entrust nshield Connect Xc High
Entrust nshield Connect Xc High Firmware
Entrust nshield Hsmi Firmware
Entrust nshield Connect Xc Base

02 Dec 2025, 19:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.2
CWE CWE-269
CWE-284
References () https://github.com/google/security-research/security/advisories/GHSA-6q4x-m86j-gfwj - () https://github.com/google/security-research/security/advisories/GHSA-6q4x-m86j-gfwj -

02 Dec 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-02 15:15

Updated : 2025-12-08 19:31


NVD link : CVE-2025-59697

Mitre link : CVE-2025-59697

CVE.ORG link : CVE-2025-59697


JSON object : View

Products Affected

entrust

  • nshield_hsmi_firmware
  • nshield_5c
  • nshield_connect_xc_mid
  • nshield_5c_firmware
  • nshield_connect_xc_high_firmware
  • nshield_connect_xc_mid_firmware
  • nshield_connect_xc_base
  • nshield_hsmi
  • nshield_connect_xc_base_firmware
  • nshield_connect_xc_high
CWE
CWE-269

Improper Privilege Management

CWE-284

Improper Access Control