Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59699: n/a

0
Medium
VulnerabilityCVE-2025-59699cvecve-2025-59699
Published: Tue Dec 02 2025 (12/02/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allow a physically proximate attacker to escalate privileges by booting from a USB device with a valid root filesystem. This occurs because of insecure default settings in the Legacy GRUB Bootloader.

AI-Powered Analysis

AILast updated: 12/09/2025, 16:44:22 UTC

Technical Analysis

CVE-2025-59699 is a vulnerability in Entrust nShield hardware security modules (HSMs), specifically the Connect XC, 5c, and HSMi models running firmware versions through 13.6.11 or 13.7. The root cause is insecure default configurations in the Legacy GRUB Bootloader, which allows booting from external USB devices without sufficient security controls. An attacker with physical proximity can exploit this by inserting a USB device containing a valid root filesystem and rebooting the HSM. This process bypasses normal authentication and security mechanisms, enabling privilege escalation to root level on the device. Given that HSMs are designed to securely store cryptographic keys and perform sensitive cryptographic operations, such unauthorized access can compromise the confidentiality and integrity of cryptographic material and disrupt availability. The vulnerability is rated with a CVSS 3.1 score of 6.8 (medium severity), reflecting the requirement for physical access but the high impact on confidentiality, integrity, and availability. No patches or exploits are currently documented, but the risk remains significant due to the critical role of HSMs in secure environments. The vulnerability is categorized under CWE-290 (Authentication Bypass by Spoofing), emphasizing the bypass of bootloader security controls. Organizations relying on these Entrust HSMs should review bootloader configurations and physical security policies to mitigate risk.

Potential Impact

The impact of CVE-2025-59699 on European organizations is substantial due to the critical role of Entrust nShield HSMs in securing cryptographic keys used for data protection, authentication, and digital signatures. Successful exploitation can lead to full compromise of the HSM, exposing sensitive cryptographic keys and enabling attackers to decrypt confidential data, forge digital signatures, or disrupt cryptographic services. This can undermine trust in secure communications, financial transactions, and identity management systems. Industries such as banking, government agencies, telecommunications, and critical infrastructure operators in Europe are particularly at risk. The requirement for physical access limits remote exploitation but increases the threat from insider attackers or attackers with physical access during maintenance or in less secure environments. The vulnerability could also facilitate supply chain attacks or targeted espionage. Disruption or compromise of HSMs could lead to regulatory non-compliance, financial losses, and reputational damage.

Mitigation Recommendations

To mitigate CVE-2025-59699, organizations should implement the following specific measures: 1) Disable Legacy GRUB Bootloader support or configure it to disallow booting from external USB devices unless explicitly authorized. 2) Enable secure boot mechanisms where supported to ensure only trusted firmware and bootloaders are executed. 3) Physically secure HSM devices in locked, access-controlled environments with surveillance and logging to prevent unauthorized physical access. 4) Regularly audit and verify bootloader configurations and firmware versions to detect insecure defaults or unauthorized changes. 5) Implement strict operational procedures for maintenance personnel, including supervision and access logging. 6) Coordinate with Entrust for firmware updates or patches addressing this vulnerability once available. 7) Consider network segmentation and monitoring to detect anomalous activity that could indicate compromise of HSMs. 8) Conduct security awareness training for staff on the risks of physical attacks and insider threats related to HSMs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692efeb83a1612a93738c047

Added to database: 12/2/2025, 2:59:04 PM

Last enriched: 12/9/2025, 4:44:22 PM

Last updated: 1/19/2026, 8:40:35 PM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats