CVE-2025-59702: n/a
Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allow a physically proximate attacker with elevated privileges to falsify tamper events by accessing internal components.
AI Analysis
Technical Summary
CVE-2025-59702 is a vulnerability identified in Entrust nShield hardware security modules (HSMs), specifically the Connect XC, 5c, and HSMi models up to firmware versions 13.6.11 and 13.7. The flaw allows an attacker who has both physical proximity and elevated privileges on the device to falsify tamper events by accessing and manipulating internal components of the HSM. Tamper events are security mechanisms designed to detect and respond to unauthorized physical access or tampering attempts, often triggering protective measures such as zeroization of sensitive keys. By falsifying these events, an attacker can potentially bypass or confuse the HSM’s tamper detection, undermining the device’s integrity and security guarantees. The vulnerability is classified under CWE-284 (Improper Access Control) and CWE-203 (Information Exposure Through Discrepancy), indicating weaknesses in access control and information leakage. The CVSS v3.1 base score is 7.2 (high severity), with attack vector requiring physical access (AV:P), low attack complexity (AC:L), high privileges (PR:H), no user interaction (UI:N), and a scope change (S:C) that affects confidentiality, integrity, and availability (C:H/I:H/A:H). This means exploitation is feasible with physical access and elevated privileges, and can have widespread impact on the security properties of the HSM and dependent systems. No public exploits are known at this time, but the vulnerability poses a significant risk to environments relying on these HSMs for cryptographic key protection and secure operations. The lack of available patches at the time of disclosure necessitates immediate compensating controls.
Potential Impact
For European organizations, the impact of this vulnerability is substantial, especially for those in sectors relying heavily on hardware security modules for cryptographic key management, such as financial institutions, government agencies, telecommunications, and critical infrastructure operators. Successful exploitation could lead to falsified tamper alerts, preventing legitimate detection of physical intrusion attempts, and potentially enabling attackers to extract or manipulate cryptographic keys and sensitive data. This compromises confidentiality and integrity of encrypted communications and stored secrets, and may disrupt availability if the HSM’s protective mechanisms are triggered incorrectly or disabled. The trustworthiness of digital signatures, secure transactions, and identity management systems could be undermined, leading to regulatory compliance issues and reputational damage. Given the physical access requirement, insider threats or attackers with physical proximity to HSMs pose the greatest risk. The vulnerability’s scope change means that compromised HSMs could affect multiple connected systems, amplifying the impact across organizational infrastructure.
Mitigation Recommendations
1. Enforce strict physical security controls around HSM devices, including secure access areas, surveillance, and tamper-evident seals to prevent unauthorized physical proximity. 2. Limit and monitor privileged user access to the HSMs, employing role-based access control and multi-factor authentication to reduce risk of insider threats. 3. Implement continuous monitoring and alerting for anomalous tamper events or unusual device behavior that could indicate exploitation attempts. 4. Segregate HSMs from general network access where possible, using dedicated management networks to reduce attack surface. 5. Maintain an inventory of all Entrust nShield devices and firmware versions to identify affected units. 6. Engage with Entrust support for timely updates and patches as they become available, and plan for rapid deployment. 7. Conduct regular security audits and penetration testing focusing on physical security and HSM integrity. 8. Develop incident response plans specifically addressing HSM compromise scenarios to minimize impact if exploitation occurs.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Sweden
CVE-2025-59702: n/a
Description
Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allow a physically proximate attacker with elevated privileges to falsify tamper events by accessing internal components.
AI-Powered Analysis
Technical Analysis
CVE-2025-59702 is a vulnerability identified in Entrust nShield hardware security modules (HSMs), specifically the Connect XC, 5c, and HSMi models up to firmware versions 13.6.11 and 13.7. The flaw allows an attacker who has both physical proximity and elevated privileges on the device to falsify tamper events by accessing and manipulating internal components of the HSM. Tamper events are security mechanisms designed to detect and respond to unauthorized physical access or tampering attempts, often triggering protective measures such as zeroization of sensitive keys. By falsifying these events, an attacker can potentially bypass or confuse the HSM’s tamper detection, undermining the device’s integrity and security guarantees. The vulnerability is classified under CWE-284 (Improper Access Control) and CWE-203 (Information Exposure Through Discrepancy), indicating weaknesses in access control and information leakage. The CVSS v3.1 base score is 7.2 (high severity), with attack vector requiring physical access (AV:P), low attack complexity (AC:L), high privileges (PR:H), no user interaction (UI:N), and a scope change (S:C) that affects confidentiality, integrity, and availability (C:H/I:H/A:H). This means exploitation is feasible with physical access and elevated privileges, and can have widespread impact on the security properties of the HSM and dependent systems. No public exploits are known at this time, but the vulnerability poses a significant risk to environments relying on these HSMs for cryptographic key protection and secure operations. The lack of available patches at the time of disclosure necessitates immediate compensating controls.
Potential Impact
For European organizations, the impact of this vulnerability is substantial, especially for those in sectors relying heavily on hardware security modules for cryptographic key management, such as financial institutions, government agencies, telecommunications, and critical infrastructure operators. Successful exploitation could lead to falsified tamper alerts, preventing legitimate detection of physical intrusion attempts, and potentially enabling attackers to extract or manipulate cryptographic keys and sensitive data. This compromises confidentiality and integrity of encrypted communications and stored secrets, and may disrupt availability if the HSM’s protective mechanisms are triggered incorrectly or disabled. The trustworthiness of digital signatures, secure transactions, and identity management systems could be undermined, leading to regulatory compliance issues and reputational damage. Given the physical access requirement, insider threats or attackers with physical proximity to HSMs pose the greatest risk. The vulnerability’s scope change means that compromised HSMs could affect multiple connected systems, amplifying the impact across organizational infrastructure.
Mitigation Recommendations
1. Enforce strict physical security controls around HSM devices, including secure access areas, surveillance, and tamper-evident seals to prevent unauthorized physical proximity. 2. Limit and monitor privileged user access to the HSMs, employing role-based access control and multi-factor authentication to reduce risk of insider threats. 3. Implement continuous monitoring and alerting for anomalous tamper events or unusual device behavior that could indicate exploitation attempts. 4. Segregate HSMs from general network access where possible, using dedicated management networks to reduce attack surface. 5. Maintain an inventory of all Entrust nShield devices and firmware versions to identify affected units. 6. Engage with Entrust support for timely updates and patches as they become available, and plan for rapid deployment. 7. Conduct regular security audits and penetration testing focusing on physical security and HSM integrity. 8. Develop incident response plans specifically addressing HSM compromise scenarios to minimize impact if exploitation occurs.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-09-18T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 692efeb83a1612a93738c053
Added to database: 12/2/2025, 2:59:04 PM
Last enriched: 12/9/2025, 4:53:06 PM
Last updated: 1/16/2026, 10:12:28 PM
Views: 48
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-21223: CWE-269: Improper Privilege Management in Microsoft Microsoft Edge (Chromium-based)
MediumCVE-2026-20960: CWE-285: Improper Authorization in Microsoft Microsoft Power Apps
HighCVE-2025-56451: n/a
MediumCVE-2026-23800: CWE-266 Incorrect Privilege Assignment in Modular DS
CriticalCVE-2026-23744: CWE-306: Missing Authentication for Critical Function in MCPJam inspector
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.