CVE-2025-59704: n/a
Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allow an attacker to gain access the the BIOS menu because is has no password.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-59704 affects Entrust nShield Connect XC, nShield 5c, and nShield HSMi devices through versions 13.6.11 and 13.7. These hardware security modules are widely used for secure cryptographic key storage and operations in enterprise and government environments. The core issue is that the BIOS menu on these devices is not protected by any password, allowing unauthorized users with physical or administrative access to enter the BIOS interface. This access can enable attackers to modify boot settings, potentially bypass security controls, or disrupt cryptographic functions. Since HSMs are foundational to securing cryptographic keys and operations, unauthorized BIOS access undermines the device's security guarantees. Although no public exploits have been reported, the vulnerability represents a significant risk vector, especially in environments where physical security controls may be insufficient. The lack of BIOS password protection is a fundamental security oversight that can lead to compromise of the device's integrity and confidentiality. The vulnerability was reserved in September 2025 and published in December 2025, with no CVSS score assigned yet. The absence of password protection on BIOS menus in such critical devices is a serious security flaw that requires immediate attention from affected organizations.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial. Entrust nShield HSMs are commonly deployed in sectors requiring high assurance for cryptographic operations, including banking, government, telecommunications, and critical infrastructure. Unauthorized BIOS access could allow attackers to alter device configurations, potentially leading to key extraction, cryptographic operation manipulation, or device denial of service. This compromises the confidentiality and integrity of sensitive data and cryptographic keys, potentially enabling further attacks such as data breaches, fraud, or disruption of critical services. The vulnerability also increases the risk of insider threats or physical tampering attacks, especially in environments where physical security is less stringent. Given the strategic importance of cryptographic security in Europe’s digital economy and regulatory environment (e.g., GDPR, NIS Directive), exploitation could lead to regulatory penalties and loss of trust. The lack of known exploits suggests the threat is not yet widespread, but the potential impact warrants urgent mitigation.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately implement BIOS password protection on all affected Entrust nShield HSM devices to prevent unauthorized BIOS access. Physical security controls must be enhanced to restrict access to HSM hardware, including secure data center environments with controlled entry and surveillance. Regular audits and monitoring of device configurations should be conducted to detect unauthorized changes. Firmware updates or patches from Entrust should be applied as soon as they become available, even though no patch links are currently provided. Additionally, organizations should review and strengthen administrative access policies, ensuring that only trusted personnel have management rights to HSM devices. Employing tamper-evident seals and intrusion detection mechanisms on HSMs can further reduce risk. Finally, organizations should consider segmenting networks and isolating HSMs to limit exposure in case of compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-59704: n/a
Description
Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allow an attacker to gain access the the BIOS menu because is has no password.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-59704 affects Entrust nShield Connect XC, nShield 5c, and nShield HSMi devices through versions 13.6.11 and 13.7. These hardware security modules are widely used for secure cryptographic key storage and operations in enterprise and government environments. The core issue is that the BIOS menu on these devices is not protected by any password, allowing unauthorized users with physical or administrative access to enter the BIOS interface. This access can enable attackers to modify boot settings, potentially bypass security controls, or disrupt cryptographic functions. Since HSMs are foundational to securing cryptographic keys and operations, unauthorized BIOS access undermines the device's security guarantees. Although no public exploits have been reported, the vulnerability represents a significant risk vector, especially in environments where physical security controls may be insufficient. The lack of BIOS password protection is a fundamental security oversight that can lead to compromise of the device's integrity and confidentiality. The vulnerability was reserved in September 2025 and published in December 2025, with no CVSS score assigned yet. The absence of password protection on BIOS menus in such critical devices is a serious security flaw that requires immediate attention from affected organizations.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial. Entrust nShield HSMs are commonly deployed in sectors requiring high assurance for cryptographic operations, including banking, government, telecommunications, and critical infrastructure. Unauthorized BIOS access could allow attackers to alter device configurations, potentially leading to key extraction, cryptographic operation manipulation, or device denial of service. This compromises the confidentiality and integrity of sensitive data and cryptographic keys, potentially enabling further attacks such as data breaches, fraud, or disruption of critical services. The vulnerability also increases the risk of insider threats or physical tampering attacks, especially in environments where physical security is less stringent. Given the strategic importance of cryptographic security in Europe’s digital economy and regulatory environment (e.g., GDPR, NIS Directive), exploitation could lead to regulatory penalties and loss of trust. The lack of known exploits suggests the threat is not yet widespread, but the potential impact warrants urgent mitigation.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately implement BIOS password protection on all affected Entrust nShield HSM devices to prevent unauthorized BIOS access. Physical security controls must be enhanced to restrict access to HSM hardware, including secure data center environments with controlled entry and surveillance. Regular audits and monitoring of device configurations should be conducted to detect unauthorized changes. Firmware updates or patches from Entrust should be applied as soon as they become available, even though no patch links are currently provided. Additionally, organizations should review and strengthen administrative access policies, ensuring that only trusted personnel have management rights to HSM devices. Employing tamper-evident seals and intrusion detection mechanisms on HSMs can further reduce risk. Finally, organizations should consider segmenting networks and isolating HSMs to limit exposure in case of compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-09-18T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 692f093f16d939a309c30994
Added to database: 12/2/2025, 3:43:59 PM
Last enriched: 12/2/2025, 3:58:27 PM
Last updated: 12/2/2025, 5:01:45 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-65656: n/a
UnknownCVE-2025-65358: n/a
HighCVE-2024-52059: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in RTI Connext Professional
MediumCVE-2025-65186: n/a
UnknownCVE-2025-65187: n/a
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.