Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59705: n/a

0
Medium
VulnerabilityCVE-2025-59705cvecve-2025-59705
Published: Tue Dec 02 2025 (12/02/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allow a Physically Proximate Attacker to Escalate Privileges by enabling the USB interface through chassis probe insertion during system boot, aka "Unauthorized Reactivation of the USB interface" or F01.

AI-Powered Analysis

AILast updated: 12/09/2025, 16:49:44 UTC

Technical Analysis

CVE-2025-59705 is a privilege escalation vulnerability found in Entrust nShield hardware security modules (HSMs), specifically the Connect XC, 5c, and HSMi models up to firmware versions 13.6.11 and 13.7. The flaw arises from the ability of an attacker with physical proximity to the device to insert a chassis probe during system boot, which triggers unauthorized reactivation of the USB interface. Normally, the USB interface is disabled or tightly controlled to prevent unauthorized access; however, this vulnerability bypasses those protections, allowing the attacker to gain elevated privileges on the device. This can lead to full compromise of the HSM’s security functions, including exposure or manipulation of cryptographic keys and sensitive operations. The vulnerability is classified under CWE-269 (Improper Privilege Management), indicating a failure to properly restrict privilege escalation paths. The CVSS v3.1 base score is 6.8, with vector AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating that while physical access is required (AV:P), the attack is relatively easy to perform (AC:L) without authentication or user interaction, and results in high impact on confidentiality, integrity, and availability. No patches or mitigations have been officially released yet, and no exploits are known in the wild. The vulnerability highlights the critical importance of physical security for HSM devices, which are foundational to cryptographic trust in many organizations.

Potential Impact

For European organizations, the impact of CVE-2025-59705 is significant due to the critical role Entrust nShield HSMs play in securing cryptographic keys, digital signatures, and sensitive transactions. Exploitation could lead to unauthorized extraction or manipulation of cryptographic material, undermining the security of encrypted communications, identity management, and transaction integrity. This could affect sectors such as finance, government, telecommunications, and critical infrastructure, where HSMs are widely deployed. The physical access requirement limits remote exploitation but raises concerns about insider threats or attackers gaining physical proximity in data centers or secure facilities. Compromise of HSMs can have cascading effects, including loss of trust in PKI systems, regulatory non-compliance (e.g., GDPR, eIDAS), and potential financial and reputational damage. The absence of patches means organizations must rely on physical security and monitoring until a vendor fix is available.

Mitigation Recommendations

1. Enforce strict physical security controls around HSM devices, including locked cabinets, surveillance, and access logging to prevent unauthorized physical proximity or tampering. 2. Implement tamper-evident seals and chassis intrusion detection mechanisms to alert on unauthorized hardware access attempts. 3. Restrict personnel access to only trusted and vetted individuals with a clear need to access HSM hardware. 4. Monitor system boot processes and USB interface status for anomalies that could indicate unauthorized reactivation attempts. 5. Coordinate with Entrust to obtain and apply firmware updates or patches as soon as they are released. 6. Conduct regular security audits and penetration tests focusing on physical security and hardware interface protections. 7. Consider deploying additional layers of cryptographic key protection, such as multi-factor authentication for key usage or key splitting, to reduce risk if an HSM is compromised. 8. Review and update incident response plans to include scenarios involving physical tampering of cryptographic hardware.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692eface3a1612a93732ddee

Added to database: 12/2/2025, 2:42:22 PM

Last enriched: 12/9/2025, 4:49:44 PM

Last updated: 1/19/2026, 12:51:50 AM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats