Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allow a physically proximate attacker to escalate privileges by booting from a USB device with a valid root filesystem. This occurs because of insecure default settings in the Legacy GRUB Bootloader.
References
| Link | Resource |
|---|---|
| https://github.com/google/security-research/security/advisories/GHSA-6q4x-m86j-gfwj | Exploit Third Party Advisory |
| https://www.entrust.com/use-case/why-use-an-hsm | Product |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
| AND |
|
Configuration 5 (hide)
| AND |
|
History
No history.
Information
Published : 2025-12-02 15:15
Updated : 2025-12-08 19:41
NVD link : CVE-2025-59699
Mitre link : CVE-2025-59699
CVE.ORG link : CVE-2025-59699
JSON object : View
Products Affected
entrust
- nshield_connect_xc_mid_firmware
- nshield_hsmi
- nshield_connect_xc_high_firmware
- nshield_5c_firmware
- nshield_connect_xc_base
- nshield_connect_xc_base_firmware
- nshield_connect_xc_high
- nshield_hsmi_firmware
- nshield_connect_xc_mid
- nshield_5c
CWE
CWE-290
Authentication Bypass by Spoofing
