CRITICAL · 9.8

CVE-2025-59693

The Chassis Management Board in Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allows a physically proximate attacker to obtain debug access and escalate privileges...

Vulnerability Description

The Chassis Management Board in Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allows a physically proximate attacker to obtain debug access and escalate privileges by bypassing the tamper label and opening the chassis without leaving evidence, and accessing the JTAG connector. This is called F02.

CVSS Score

9.8

CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
EntrustNshield 5C Firmware< 13.6.12
EntrustNshield 5C-
EntrustNshield Hsmi Firmware< 13.6.12
EntrustNshield Hsmi-
EntrustNshield Connect Xc Base Firmware< 13.6.12
EntrustNshield Connect Xc Base-
EntrustNshield Connect Xc Mid Firmware< 13.6.12
EntrustNshield Connect Xc Mid-
EntrustNshield Connect Xc High Firmware< 13.6.12
EntrustNshield Connect Xc High-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2025-59693?

CVE-2025-59693 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The Chassis Management Board in Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allows a physically proximate attacker to obtain debug access and escalate privileges...

How severe is CVE-2025-59693?

CVE-2025-59693 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.

Is there a patch for CVE-2025-59693?

Check the references section above for vendor advisories and patch information. Affected products include: Entrust Nshield 5C Firmware, Entrust Nshield 5C, Entrust Nshield Hsmi Firmware, Entrust Nshield Hsmi, Entrust Nshield Connect Xc Base Firmware.