The Chassis Management Board in Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allows a physically proximate attacker to persistently modify firmware and influence the (insecurely configured) appliance boot process. To exploit this, the attacker must modify the firmware via JTAG or perform an upgrade to the chassis management board firmware. This is called F03.
Metrics
Affected Vendors & Products
References
History
Mon, 15 Dec 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Entrust nshield 5c Firmware
Entrust nshield Connect Xc Base Entrust nshield Connect Xc Base Firmware Entrust nshield Connect Xc High Entrust nshield Connect Xc High Firmware Entrust nshield Connect Xc Mid Entrust nshield Connect Xc Mid Firmware Entrust nshield Hsmi Firmware |
|
| CPEs | cpe:2.3:h:entrust:nshield_5c:-:*:*:*:*:*:*:* cpe:2.3:h:entrust:nshield_connect_xc_base:-:*:*:*:*:*:*:* cpe:2.3:h:entrust:nshield_connect_xc_high:-:*:*:*:*:*:*:* cpe:2.3:h:entrust:nshield_connect_xc_mid:-:*:*:*:*:*:*:* cpe:2.3:h:entrust:nshield_hsmi:-:*:*:*:*:*:*:* cpe:2.3:o:entrust:nshield_5c_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:entrust:nshield_connect_xc_base_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:entrust:nshield_connect_xc_high_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:entrust:nshield_connect_xc_mid_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:entrust:nshield_hsmi_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Entrust nshield 5c Firmware
Entrust nshield Connect Xc Base Entrust nshield Connect Xc Base Firmware Entrust nshield Connect Xc High Entrust nshield Connect Xc High Firmware Entrust nshield Connect Xc Mid Entrust nshield Connect Xc Mid Firmware Entrust nshield Hsmi Firmware |
Thu, 04 Dec 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Entrust
Entrust nshield 5c Entrust nshield Connect Xc Entrust nshield Hsmi |
|
| Vendors & Products |
Entrust
Entrust nshield 5c Entrust nshield Connect Xc Entrust nshield Hsmi |
Wed, 03 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-1274 | |
| Metrics |
cvssV3_1
|
Tue, 02 Dec 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Chassis Management Board in Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allows a physically proximate attacker to persistently modify firmware and influence the (insecurely configured) appliance boot process. To exploit this, the attacker must modify the firmware via JTAG or perform an upgrade to the chassis management board firmware. This is called F03. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-12-02T00:00:00.000Z
Updated: 2025-12-03T16:08:20.902Z
Reserved: 2025-09-18T00:00:00.000Z
Link: CVE-2025-59694
Updated: 2025-12-03T16:07:58.195Z
Status : Analyzed
Published: 2025-12-02T15:15:54.883
Modified: 2025-12-15T13:39:22.617
Link: CVE-2025-59694
No data.