Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allow a Physically Proximate Attacker to access the internal components of the appliance, without leaving tamper evidence. To exploit this, the attacker needs to remove the tamper label and all fixing screws from the device without damaging it. This is called an F14 attack.
References
| Link | Resource |
|---|---|
| https://github.com/google/security-research/security/advisories/GHSA-6q4x-m86j-gfwj | Exploit Third Party Advisory |
| https://www.entrust.com/use-case/why-use-an-hsm | Product |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
| AND |
|
Configuration 5 (hide)
| AND |
|
History
No history.
Information
Published : 2025-12-02 16:15
Updated : 2025-12-08 19:39
NVD link : CVE-2025-59703
Mitre link : CVE-2025-59703
CVE.ORG link : CVE-2025-59703
JSON object : View
Products Affected
entrust
- nshield_connect_xc_mid_firmware
- nshield_hsmi
- nshield_connect_xc_high_firmware
- nshield_5c_firmware
- nshield_connect_xc_base
- nshield_connect_xc_base_firmware
- nshield_connect_xc_high
- nshield_hsmi_firmware
- nshield_connect_xc_mid
- nshield_5c
CWE
CWE-284
Improper Access Control
