The Chassis Management Board in Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allows a physically proximate attacker to persistently modify firmware and influence the (insecurely configured) appliance boot process. To exploit this, the attacker must modify the firmware via JTAG or perform an upgrade to the chassis management board firmware. This is called F03.
History

Mon, 15 Dec 2025 13:45:00 +0000

Type Values Removed Values Added
First Time appeared Entrust nshield 5c Firmware
Entrust nshield Connect Xc Base
Entrust nshield Connect Xc Base Firmware
Entrust nshield Connect Xc High
Entrust nshield Connect Xc High Firmware
Entrust nshield Connect Xc Mid
Entrust nshield Connect Xc Mid Firmware
Entrust nshield Hsmi Firmware
CPEs cpe:2.3:h:entrust:nshield_5c:-:*:*:*:*:*:*:*
cpe:2.3:h:entrust:nshield_connect_xc_base:-:*:*:*:*:*:*:*
cpe:2.3:h:entrust:nshield_connect_xc_high:-:*:*:*:*:*:*:*
cpe:2.3:h:entrust:nshield_connect_xc_mid:-:*:*:*:*:*:*:*
cpe:2.3:h:entrust:nshield_hsmi:-:*:*:*:*:*:*:*
cpe:2.3:o:entrust:nshield_5c_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:entrust:nshield_connect_xc_base_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:entrust:nshield_connect_xc_high_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:entrust:nshield_connect_xc_mid_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:entrust:nshield_hsmi_firmware:*:*:*:*:*:*:*:*
Vendors & Products Entrust nshield 5c Firmware
Entrust nshield Connect Xc Base
Entrust nshield Connect Xc Base Firmware
Entrust nshield Connect Xc High
Entrust nshield Connect Xc High Firmware
Entrust nshield Connect Xc Mid
Entrust nshield Connect Xc Mid Firmware
Entrust nshield Hsmi Firmware

Thu, 04 Dec 2025 17:00:00 +0000

Type Values Removed Values Added
First Time appeared Entrust
Entrust nshield 5c
Entrust nshield Connect Xc
Entrust nshield Hsmi
Vendors & Products Entrust
Entrust nshield 5c
Entrust nshield Connect Xc
Entrust nshield Hsmi

Wed, 03 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1274
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 02 Dec 2025 14:45:00 +0000

Type Values Removed Values Added
Description The Chassis Management Board in Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allows a physically proximate attacker to persistently modify firmware and influence the (insecurely configured) appliance boot process. To exploit this, the attacker must modify the firmware via JTAG or perform an upgrade to the chassis management board firmware. This is called F03.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-12-02T00:00:00.000Z

Updated: 2025-12-03T16:08:20.902Z

Reserved: 2025-09-18T00:00:00.000Z

Link: CVE-2025-59694

cve-icon Vulnrichment

Updated: 2025-12-03T16:07:58.195Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-02T15:15:54.883

Modified: 2025-12-15T13:39:22.617

Link: CVE-2025-59694

cve-icon Redhat

No data.