Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59695: n/a

0
Critical
VulnerabilityCVE-2025-59695cvecve-2025-59695
Published: Tue Dec 02 2025 (12/02/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allow a user with OS root access to alter firmware on the Chassis Management Board (without Authentication). This is called F04.

AI-Powered Analysis

AILast updated: 12/02/2025, 14:57:34 UTC

Technical Analysis

CVE-2025-59695 is a firmware modification vulnerability affecting Entrust nShield Connect XC, nShield 5c, and nShield HSMi devices up to versions 13.6.11 and 13.7. The vulnerability allows any user who has obtained root-level access on the host operating system to alter the firmware on the Chassis Management Board without any additional authentication checks. The Chassis Management Board controls critical hardware functions, and unauthorized firmware changes can lead to persistent compromise of the hardware security module (HSM). This could undermine the cryptographic operations performed by the HSM, including key generation, storage, and cryptographic signing, potentially allowing attackers to extract keys, manipulate cryptographic processes, or cause denial of service. The vulnerability does not require remote exploitation; it is dependent on an attacker first gaining root privileges on the host system. No CVSS score has been assigned yet, and no public exploits have been observed. The vulnerability was reserved in September 2025 and published in December 2025. The lack of authentication for firmware updates on the Chassis Management Board represents a critical design flaw that could be exploited by insiders or attackers who have escalated privileges. Given the critical role of these HSMs in securing sensitive data and transactions, this vulnerability poses a significant risk to organizations relying on these devices for cryptographic security.

Potential Impact

For European organizations, the exploitation of CVE-2025-59695 could have severe consequences. Entrust nShield HSMs are widely used in financial institutions, government agencies, and critical infrastructure sectors across Europe to protect cryptographic keys and perform secure cryptographic operations. Unauthorized firmware modification could lead to the compromise of cryptographic keys, enabling attackers to decrypt sensitive communications, forge digital signatures, or disrupt secure transactions. This undermines confidentiality, integrity, and availability of critical security functions. The risk is particularly high in sectors with stringent regulatory requirements such as GDPR, PSD2, and eIDAS, where cryptographic integrity is essential for compliance. Additionally, the ability to persist malicious firmware could facilitate long-term espionage or sabotage campaigns. Although exploitation requires root access, the vulnerability increases the attack surface for insider threats or attackers who have already compromised the host system. The overall impact includes potential financial losses, reputational damage, regulatory penalties, and disruption of essential services.

Mitigation Recommendations

To mitigate CVE-2025-59695, organizations should implement strict access controls to limit root access on systems hosting Entrust nShield HSMs. Employing multi-factor authentication and robust privilege management can reduce the risk of unauthorized root access. Monitoring and auditing of firmware integrity on the Chassis Management Board should be established, using cryptographic checksums or vendor-provided verification tools to detect unauthorized changes. Network segmentation and isolation of HSM management interfaces can limit exposure. Organizations should stay in close contact with Entrust for timely release of patches or firmware updates addressing this vulnerability and apply them promptly once available. Additionally, implementing host-based intrusion detection systems (HIDS) and continuous monitoring can help detect suspicious activities indicative of attempted firmware tampering. Regular security training for administrators to recognize and prevent privilege escalation attacks is also recommended. Finally, consider deploying hardware security modules with enhanced firmware update authentication mechanisms if available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692eface3a1612a93732ddea

Added to database: 12/2/2025, 2:42:22 PM

Last enriched: 12/2/2025, 2:57:34 PM

Last updated: 12/5/2025, 1:15:29 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats