Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59703: n/a

0
Critical
VulnerabilityCVE-2025-59703cvecve-2025-59703
Published: Tue Dec 02 2025 (12/02/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allow a Physically Proximate Attacker to access the internal components of the appliance, without leaving tamper evidence. To exploit this, the attacker needs to remove the tamper label and all fixing screws from the device without damaging it. This is called an F14 attack.

AI-Powered Analysis

AILast updated: 12/09/2025, 16:48:28 UTC

Technical Analysis

CVE-2025-59703 identifies a critical physical security vulnerability in Entrust nShield Connect XC, nShield 5c, and nShield HSMi devices up to versions 13.6.11 and 13.7. These hardware security modules (HSMs) are designed to protect cryptographic keys and operations within a tamper-resistant environment. The vulnerability allows an attacker with physical proximity to the device to remove tamper labels and screws without damaging the device or triggering tamper evidence mechanisms, a method termed the F14 attack. This physical access enables the attacker to reach internal components, potentially extracting sensitive cryptographic material or manipulating the device's operation. The CVSS 3.1 score of 9.1 reflects the vulnerability's critical impact on confidentiality and integrity, with no required privileges or user interaction and network attack vector, indicating that if physical access is gained, exploitation is straightforward. Although no known exploits are currently reported in the wild, the risk is significant due to the nature of HSMs as root trust anchors in cryptographic infrastructures. The CWE-284 classification highlights improper access control, emphasizing that physical tamper protections are insufficient. The lack of patch links suggests that mitigation may rely on physical security enhancements or future firmware updates from Entrust. This vulnerability undermines the fundamental security guarantees of HSMs, potentially allowing attackers to extract keys, impersonate legitimate cryptographic operations, or disrupt secure communications.

Potential Impact

For European organizations, the impact of CVE-2025-59703 is substantial, particularly for those relying on Entrust nShield HSMs to secure sensitive cryptographic keys and operations. Compromise of these devices can lead to unauthorized key extraction, enabling attackers to decrypt confidential communications, forge digital signatures, or bypass authentication mechanisms. This threatens confidentiality and integrity of critical data and transactions across sectors such as banking, government services, telecommunications, and critical infrastructure. The absence of tamper evidence means attacks could go undetected, prolonging exposure and increasing the risk of widespread compromise. Given the high CVSS score and critical severity, organizations face potential regulatory and compliance repercussions under frameworks like GDPR and NIS Directive if cryptographic protections are breached. The physical nature of the attack requires attackers to have direct access, which may limit exposure to on-premises data centers or facilities with inadequate physical security controls. However, insider threats or sophisticated adversaries could exploit this vulnerability to gain persistent, undetected access to cryptographic assets.

Mitigation Recommendations

Mitigation should focus on strengthening physical security controls around Entrust nShield HSM deployments. Organizations must enforce strict access controls to data centers and server rooms, including multi-factor authentication for physical entry, surveillance, and security personnel presence. Regular inspection of HSM devices for tamper labels and physical integrity is critical to detect any unauthorized access attempts. Entrust should be engaged to provide firmware updates or hardware revisions that enhance tamper detection and resistance against F14-style attacks. Where possible, deploying HSMs in secure, locked cabinets or safes with additional tamper sensors can add layers of defense. Organizations should implement strict operational procedures for handling and maintaining HSMs, including logging and auditing physical access events. Additionally, consider using complementary cryptographic protections such as key splitting or multi-party computation to reduce risk from single-device compromise. Incident response plans must include procedures for suspected physical tampering and key compromise scenarios. Finally, organizations should evaluate alternative HSM solutions with stronger physical tamper protections if remediation is delayed.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692f093f16d939a309c30990

Added to database: 12/2/2025, 3:43:59 PM

Last enriched: 12/9/2025, 4:48:28 PM

Last updated: 1/16/2026, 10:10:26 PM

Views: 73

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats