The Chassis Management Board in Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allows a physically proximate attacker to persistently modify firmware and influence the (insecurely configured) appliance boot process. To exploit this, the attacker must modify the firmware via JTAG or perform an upgrade to the chassis management board firmware. This is called F03.
Metrics
Affected Vendors & Products
References
History
Thu, 04 Dec 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Entrust
Entrust nshield 5c Entrust nshield Connect Xc Entrust nshield Hsmi |
|
| Vendors & Products |
Entrust
Entrust nshield 5c Entrust nshield Connect Xc Entrust nshield Hsmi |
Wed, 03 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-1274 | |
| Metrics |
cvssV3_1
|
Tue, 02 Dec 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Chassis Management Board in Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allows a physically proximate attacker to persistently modify firmware and influence the (insecurely configured) appliance boot process. To exploit this, the attacker must modify the firmware via JTAG or perform an upgrade to the chassis management board firmware. This is called F03. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-12-02T00:00:00.000Z
Updated: 2025-12-03T16:08:20.902Z
Reserved: 2025-09-18T00:00:00.000Z
Link: CVE-2025-59694
Updated: 2025-12-03T16:07:58.195Z
Status : Awaiting Analysis
Published: 2025-12-02T15:15:54.883
Modified: 2025-12-03T16:15:57.770
Link: CVE-2025-59694
No data.