CVE-2025-59705

Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allow a Physically Proximate Attacker to Escalate Privileges by enabling the USB interface through chassis probe insertion during system boot, aka "Unauthorized Reactivation of the USB interface" or F01.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:entrust:nshield_5c_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:entrust:nshield_5c_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:entrust:nshield_5c:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:o:entrust:nshield_hsmi_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:entrust:nshield_hsmi_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:entrust:nshield_hsmi:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
OR cpe:2.3:o:entrust:nshield_connect_xc_base_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:entrust:nshield_connect_xc_base_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:entrust:nshield_connect_xc_base:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
OR cpe:2.3:o:entrust:nshield_connect_xc_mid_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:entrust:nshield_connect_xc_mid_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:entrust:nshield_connect_xc_mid:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
OR cpe:2.3:o:entrust:nshield_connect_xc_high_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:entrust:nshield_connect_xc_high_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:entrust:nshield_connect_xc_high:-:*:*:*:*:*:*:*

History

08 Dec 2025, 19:39

Type Values Removed Values Added
First Time Entrust nshield Hsmi
Entrust nshield 5c
Entrust nshield Connect Xc Base Firmware
Entrust
Entrust nshield Connect Xc Mid Firmware
Entrust nshield 5c Firmware
Entrust nshield Connect Xc Mid
Entrust nshield Connect Xc High
Entrust nshield Connect Xc High Firmware
Entrust nshield Hsmi Firmware
Entrust nshield Connect Xc Base
CPE cpe:2.3:o:entrust:nshield_connect_xc_mid_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:entrust:nshield_connect_xc_high:-:*:*:*:*:*:*:*
cpe:2.3:h:entrust:nshield_connect_xc_mid:-:*:*:*:*:*:*:*
cpe:2.3:h:entrust:nshield_5c:-:*:*:*:*:*:*:*
cpe:2.3:h:entrust:nshield_hsmi:-:*:*:*:*:*:*:*
cpe:2.3:o:entrust:nshield_hsmi_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:entrust:nshield_5c_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:entrust:nshield_connect_xc_base:-:*:*:*:*:*:*:*
cpe:2.3:o:entrust:nshield_connect_xc_base_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:entrust:nshield_connect_xc_high_firmware:*:*:*:*:*:*:*:*
References () https://github.com/google/security-research/security/advisories/GHSA-6q4x-m86j-gfwj - () https://github.com/google/security-research/security/advisories/GHSA-6q4x-m86j-gfwj - Exploit, Third Party Advisory
References () https://www.entrust.com/use-case/why-use-an-hsm - () https://www.entrust.com/use-case/why-use-an-hsm - Product

03 Dec 2025, 15:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.8
CWE CWE-269

02 Dec 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-02 15:15

Updated : 2025-12-08 19:39


NVD link : CVE-2025-59705

Mitre link : CVE-2025-59705

CVE.ORG link : CVE-2025-59705


JSON object : View

Products Affected

entrust

  • nshield_hsmi_firmware
  • nshield_5c
  • nshield_connect_xc_mid
  • nshield_5c_firmware
  • nshield_connect_xc_high_firmware
  • nshield_connect_xc_mid_firmware
  • nshield_connect_xc_base
  • nshield_hsmi
  • nshield_connect_xc_base_firmware
  • nshield_connect_xc_high
CWE
CWE-269

Improper Privilege Management