Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allow a Physically Proximate Attacker to Escalate Privileges by enabling the USB interface through chassis probe insertion during system boot, aka "Unauthorized Reactivation of the USB interface" or F01.
References
| Link | Resource |
|---|---|
| https://github.com/google/security-research/security/advisories/GHSA-6q4x-m86j-gfwj | Exploit Third Party Advisory |
| https://www.entrust.com/use-case/why-use-an-hsm | Product |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
| AND |
|
Configuration 5 (hide)
| AND |
|
History
No history.
Information
Published : 2025-12-02 15:15
Updated : 2025-12-08 19:39
NVD link : CVE-2025-59705
Mitre link : CVE-2025-59705
CVE.ORG link : CVE-2025-59705
JSON object : View
Products Affected
entrust
- nshield_connect_xc_mid_firmware
- nshield_hsmi
- nshield_connect_xc_high_firmware
- nshield_5c_firmware
- nshield_connect_xc_base
- nshield_connect_xc_base_firmware
- nshield_connect_xc_high
- nshield_hsmi_firmware
- nshield_connect_xc_mid
- nshield_5c
CWE
CWE-269
Improper Privilege Management
