Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59704: n/a

0
Unknown
VulnerabilityCVE-2025-59704cvecve-2025-59704
Published: Tue Dec 02 2025 (12/02/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allow an attacker to gain access the the BIOS menu because is has no password.

AI-Powered Analysis

AILast updated: 12/02/2025, 15:58:27 UTC

Technical Analysis

The vulnerability identified as CVE-2025-59704 affects Entrust nShield Connect XC, nShield 5c, and nShield HSMi devices through versions 13.6.11 and 13.7. These hardware security modules are widely used for secure cryptographic key storage and operations in enterprise and government environments. The core issue is that the BIOS menu on these devices is not protected by any password, allowing unauthorized users with physical or administrative access to enter the BIOS interface. This access can enable attackers to modify boot settings, potentially bypass security controls, or disrupt cryptographic functions. Since HSMs are foundational to securing cryptographic keys and operations, unauthorized BIOS access undermines the device's security guarantees. Although no public exploits have been reported, the vulnerability represents a significant risk vector, especially in environments where physical security controls may be insufficient. The lack of BIOS password protection is a fundamental security oversight that can lead to compromise of the device's integrity and confidentiality. The vulnerability was reserved in September 2025 and published in December 2025, with no CVSS score assigned yet. The absence of password protection on BIOS menus in such critical devices is a serious security flaw that requires immediate attention from affected organizations.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial. Entrust nShield HSMs are commonly deployed in sectors requiring high assurance for cryptographic operations, including banking, government, telecommunications, and critical infrastructure. Unauthorized BIOS access could allow attackers to alter device configurations, potentially leading to key extraction, cryptographic operation manipulation, or device denial of service. This compromises the confidentiality and integrity of sensitive data and cryptographic keys, potentially enabling further attacks such as data breaches, fraud, or disruption of critical services. The vulnerability also increases the risk of insider threats or physical tampering attacks, especially in environments where physical security is less stringent. Given the strategic importance of cryptographic security in Europe’s digital economy and regulatory environment (e.g., GDPR, NIS Directive), exploitation could lead to regulatory penalties and loss of trust. The lack of known exploits suggests the threat is not yet widespread, but the potential impact warrants urgent mitigation.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately implement BIOS password protection on all affected Entrust nShield HSM devices to prevent unauthorized BIOS access. Physical security controls must be enhanced to restrict access to HSM hardware, including secure data center environments with controlled entry and surveillance. Regular audits and monitoring of device configurations should be conducted to detect unauthorized changes. Firmware updates or patches from Entrust should be applied as soon as they become available, even though no patch links are currently provided. Additionally, organizations should review and strengthen administrative access policies, ensuring that only trusted personnel have management rights to HSM devices. Employing tamper-evident seals and intrusion detection mechanisms on HSMs can further reduce risk. Finally, organizations should consider segmenting networks and isolating HSMs to limit exposure in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692f093f16d939a309c30994

Added to database: 12/2/2025, 3:43:59 PM

Last enriched: 12/2/2025, 3:58:27 PM

Last updated: 12/2/2025, 5:01:45 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats