CVE-2025-59695: n/a
Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allow a user with OS root access to alter firmware on the Chassis Management Board (without Authentication). This is called F04.
AI Analysis
Technical Summary
CVE-2025-59695 is a firmware modification vulnerability in Entrust nShield hardware security modules (HSMs), specifically the Connect XC, 5c, and HSMi models up to firmware versions 13.6.11 and 13.7. The flaw, designated as F04, allows any user with root privileges on the underlying operating system to alter the firmware on the Chassis Management Board without requiring any additional authentication. The Chassis Management Board controls critical hardware functions and firmware integrity checks, so unauthorized modifications can lead to persistent compromise of the HSM, undermining its role as a trusted cryptographic root of trust. The vulnerability is classified under CWE-306 (Missing Authentication for Critical Function), indicating a failure to enforce authentication on sensitive operations. The CVSS v3.1 base score is 9.8 (critical), reflecting network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high impacts on confidentiality (C:H), integrity (I:H), and availability (A:H). Although no public exploits have been observed, the vulnerability's nature means that any attacker who gains root OS access can fully compromise the HSM firmware, potentially extracting or manipulating cryptographic keys and operations. This undermines the security assurances provided by the HSM, which is often used to protect sensitive cryptographic material in high-security environments.
Potential Impact
For European organizations, the impact of this vulnerability is severe due to the critical role HSMs play in securing cryptographic keys, digital signatures, and sensitive transactions. Compromise of the HSM firmware can lead to unauthorized key extraction, manipulation of cryptographic operations, and disruption of secure services. This threatens confidentiality, integrity, and availability of sensitive data and systems. Sectors such as banking, government agencies, telecommunications, and critical infrastructure operators that rely on Entrust nShield HSMs for secure key management and cryptographic operations are particularly vulnerable. The ability to alter firmware without authentication means that an attacker with root OS access can establish persistent, stealthy control over the HSM, potentially bypassing all cryptographic protections. This could facilitate large-scale fraud, espionage, or sabotage. Given the high CVSS score and critical nature of HSMs, the threat is significant for European entities that depend on these devices for compliance with regulations like GDPR and for maintaining trust in digital services.
Mitigation Recommendations
1. Restrict and tightly control root-level OS access to systems hosting Entrust nShield HSMs, employing strong authentication, role-based access controls, and regular audits. 2. Implement continuous monitoring and integrity verification of firmware on the Chassis Management Board to detect unauthorized modifications promptly. 3. Apply vendor-supplied patches or firmware updates as soon as they become available to address this vulnerability. 4. Use hardware and software-based intrusion detection systems to alert on suspicious activities related to firmware or system modifications. 5. Segregate HSM management interfaces and networks from general IT infrastructure to reduce exposure to potential attackers. 6. Conduct regular security assessments and penetration tests focusing on OS-level privilege escalation and firmware integrity. 7. Employ multi-factor authentication and just-in-time access provisioning for administrative accounts to minimize risk of root compromise. 8. Maintain an incident response plan specifically addressing HSM compromise scenarios to enable rapid containment and recovery.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-59695: n/a
Description
Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allow a user with OS root access to alter firmware on the Chassis Management Board (without Authentication). This is called F04.
AI-Powered Analysis
Technical Analysis
CVE-2025-59695 is a firmware modification vulnerability in Entrust nShield hardware security modules (HSMs), specifically the Connect XC, 5c, and HSMi models up to firmware versions 13.6.11 and 13.7. The flaw, designated as F04, allows any user with root privileges on the underlying operating system to alter the firmware on the Chassis Management Board without requiring any additional authentication. The Chassis Management Board controls critical hardware functions and firmware integrity checks, so unauthorized modifications can lead to persistent compromise of the HSM, undermining its role as a trusted cryptographic root of trust. The vulnerability is classified under CWE-306 (Missing Authentication for Critical Function), indicating a failure to enforce authentication on sensitive operations. The CVSS v3.1 base score is 9.8 (critical), reflecting network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high impacts on confidentiality (C:H), integrity (I:H), and availability (A:H). Although no public exploits have been observed, the vulnerability's nature means that any attacker who gains root OS access can fully compromise the HSM firmware, potentially extracting or manipulating cryptographic keys and operations. This undermines the security assurances provided by the HSM, which is often used to protect sensitive cryptographic material in high-security environments.
Potential Impact
For European organizations, the impact of this vulnerability is severe due to the critical role HSMs play in securing cryptographic keys, digital signatures, and sensitive transactions. Compromise of the HSM firmware can lead to unauthorized key extraction, manipulation of cryptographic operations, and disruption of secure services. This threatens confidentiality, integrity, and availability of sensitive data and systems. Sectors such as banking, government agencies, telecommunications, and critical infrastructure operators that rely on Entrust nShield HSMs for secure key management and cryptographic operations are particularly vulnerable. The ability to alter firmware without authentication means that an attacker with root OS access can establish persistent, stealthy control over the HSM, potentially bypassing all cryptographic protections. This could facilitate large-scale fraud, espionage, or sabotage. Given the high CVSS score and critical nature of HSMs, the threat is significant for European entities that depend on these devices for compliance with regulations like GDPR and for maintaining trust in digital services.
Mitigation Recommendations
1. Restrict and tightly control root-level OS access to systems hosting Entrust nShield HSMs, employing strong authentication, role-based access controls, and regular audits. 2. Implement continuous monitoring and integrity verification of firmware on the Chassis Management Board to detect unauthorized modifications promptly. 3. Apply vendor-supplied patches or firmware updates as soon as they become available to address this vulnerability. 4. Use hardware and software-based intrusion detection systems to alert on suspicious activities related to firmware or system modifications. 5. Segregate HSM management interfaces and networks from general IT infrastructure to reduce exposure to potential attackers. 6. Conduct regular security assessments and penetration tests focusing on OS-level privilege escalation and firmware integrity. 7. Employ multi-factor authentication and just-in-time access provisioning for administrative accounts to minimize risk of root compromise. 8. Maintain an incident response plan specifically addressing HSM compromise scenarios to enable rapid containment and recovery.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-09-18T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 692eface3a1612a93732ddea
Added to database: 12/2/2025, 2:42:22 PM
Last enriched: 12/9/2025, 4:43:15 PM
Last updated: 1/19/2026, 4:34:14 AM
Views: 39
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1136: Cross Site Scripting in lcg0124 BootDo
MediumCVE-2026-1135: Cross Site Scripting in itsourcecode Society Management System
MediumCVE-2026-1134: Cross Site Scripting in itsourcecode Society Management System
MediumCVE-2026-0943: CWE-1395 Dependency on Vulnerable Third-Party Component in JV HarfBuzz::Shaper
MediumCVE-2026-1133: SQL Injection in Yonyou KSOA
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.