CVE-2025-59694

The Chassis Management Board in Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allows a physically proximate attacker to persistently modify firmware and influence the (insecurely configured) appliance boot process. To exploit this, the attacker must modify the firmware via JTAG or perform an upgrade to the chassis management board firmware. This is called F03.
Configurations

No configuration.

History

03 Dec 2025, 16:15

Type Values Removed Values Added
References () https://github.com/google/security-research/security/advisories/GHSA-6q4x-m86j-gfwj - () https://github.com/google/security-research/security/advisories/GHSA-6q4x-m86j-gfwj -
CWE CWE-1274
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.8

02 Dec 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-02 15:15

Updated : 2025-12-03 16:15


NVD link : CVE-2025-59694

Mitre link : CVE-2025-59694

CVE.ORG link : CVE-2025-59694


JSON object : View

Products Affected

No product.

CWE
CWE-1274

Improper Access Control for Volatile Memory Containing Boot Code