Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59700: n/a

0
Medium
VulnerabilityCVE-2025-59700cvecve-2025-59700
Published: Tue Dec 02 2025 (12/02/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allow a physically proximate attacker with root access to modify the Recovery Partition (because of a lack of integrity protection).

AI-Powered Analysis

AILast updated: 01/06/2026, 22:07:54 UTC

Technical Analysis

CVE-2025-59700 is a vulnerability identified in Entrust nShield Connect XC, nShield 5c, and nShield HSMi devices through versions 13.6.11 and 13.7. The issue stems from a lack of integrity protection on the Recovery Partition of these hardware security modules (HSMs). An attacker who has physical proximity and root-level access on the host system can modify this partition, potentially altering recovery mechanisms or injecting malicious code. The Recovery Partition is critical as it may contain firmware or recovery images that ensure the device’s secure operation and integrity. Because the integrity of this partition is not cryptographically protected, unauthorized modifications can go undetected, undermining the trustworthiness of the HSM. The vulnerability requires local access with high privileges (root) and user interaction, limiting remote exploitation possibilities. The CVSS v3.1 score is 5.8 (medium severity), reflecting the high confidentiality and integrity impact but limited attack vector (local physical) and required privileges. No public exploits are known at this time. The CWE-345 classification indicates improper verification of data integrity, a common weakness in secure system design. Given the role of Entrust nShield HSMs in protecting cryptographic keys and performing sensitive cryptographic operations, exploitation could lead to key compromise, unauthorized cryptographic operations, or persistent device compromise.

Potential Impact

For European organizations, especially those in finance, government, and critical infrastructure sectors, this vulnerability poses a significant risk. Entrust nShield HSMs are widely used for securing cryptographic keys, digital signatures, and sensitive transactions. Unauthorized modification of the Recovery Partition could allow attackers to bypass security controls, extract or manipulate keys, or implant persistent malware within the HSM environment. This undermines the confidentiality and integrity of cryptographic operations, potentially leading to data breaches, fraudulent transactions, or loss of trust in digital identities. The requirement for physical proximity and root access limits the threat to insiders or attackers who gain physical access, but such scenarios are plausible in data centers or shared facilities. The absence of known exploits reduces immediate risk but does not eliminate the potential for targeted attacks. European organizations must consider the impact on compliance with data protection regulations and the security of critical services relying on these HSMs.

Mitigation Recommendations

1. Restrict physical access to Entrust nShield HSM devices to authorized personnel only, employing strong physical security controls such as locked cabinets, surveillance, and access logging. 2. Limit root-level access on host systems interfacing with the HSMs; enforce strict access controls, multi-factor authentication, and regular auditing of privileged accounts. 3. Monitor the integrity of the Recovery Partition and related firmware components using cryptographic checksums or vendor-provided integrity verification tools if available. 4. Implement host-based intrusion detection systems to alert on unauthorized modifications or suspicious activities around the HSM environment. 5. Engage with Entrust support to obtain and apply patches or firmware updates addressing this vulnerability as soon as they are released. 6. Conduct regular security training and awareness for personnel with physical or administrative access to HSMs to reduce insider threat risks. 7. Consider network segmentation and isolation of systems managing HSMs to reduce attack surface. 8. Maintain incident response plans that include scenarios involving HSM compromise to enable rapid detection and remediation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692efeb83a1612a93738c04b

Added to database: 12/2/2025, 2:59:04 PM

Last enriched: 1/6/2026, 10:07:54 PM

Last updated: 1/19/2026, 8:48:13 PM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats