CVE-2025-59693

The Chassis Management Board in Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allows a physically proximate attacker to obtain debug access and escalate privileges by bypassing the tamper label and opening the chassis without leaving evidence, and accessing the JTAG connector. This is called F02.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
mitreCNA
---
---
CISA-ADPADP
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 23%
VendorProductVersion
entrustnshield_5c_firmware
𝑥
< 13.6.12
entrustnshield_5c_firmware
13.7.3 ≤
𝑥
< 13.9.0
entrustnshield_hsmi_firmware
𝑥
< 13.6.12
entrustnshield_hsmi_firmware
13.7.3 ≤
𝑥
< 13.9.0
entrustnshield_connect_xc_base_firmware
𝑥
< 13.6.12
entrustnshield_connect_xc_base_firmware
13.7.3 ≤
𝑥
< 13.9.0
entrustnshield_connect_xc_mid_firmware
𝑥
< 13.6.12
entrustnshield_connect_xc_mid_firmware
13.7.3 ≤
𝑥
< 13.9.0
entrustnshield_connect_xc_high_firmware
𝑥
< 13.6.12
entrustnshield_connect_xc_high_firmware
13.7.3 ≤
𝑥
< 13.9.0
𝑥
= Vulnerable software versions