The Chassis Management Board in Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allows a physically proximate attacker to persistently modify firmware and influence the (insecurely configured) appliance boot process. To exploit this, the attacker must modify the firmware via JTAG or perform an upgrade to the chassis management board firmware. This is called F03.
History

Thu, 04 Dec 2025 17:00:00 +0000

Type Values Removed Values Added
First Time appeared Entrust
Entrust nshield 5c
Entrust nshield Connect Xc
Entrust nshield Hsmi
Vendors & Products Entrust
Entrust nshield 5c
Entrust nshield Connect Xc
Entrust nshield Hsmi

Wed, 03 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1274
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 02 Dec 2025 14:45:00 +0000

Type Values Removed Values Added
Description The Chassis Management Board in Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allows a physically proximate attacker to persistently modify firmware and influence the (insecurely configured) appliance boot process. To exploit this, the attacker must modify the firmware via JTAG or perform an upgrade to the chassis management board firmware. This is called F03.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-12-02T00:00:00.000Z

Updated: 2025-12-03T16:08:20.902Z

Reserved: 2025-09-18T00:00:00.000Z

Link: CVE-2025-59694

cve-icon Vulnrichment

Updated: 2025-12-03T16:07:58.195Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-02T15:15:54.883

Modified: 2025-12-03T16:15:57.770

Link: CVE-2025-59694

cve-icon Redhat

No data.