CVE-2025-59693

9.8 CRITICAL

📋 TL;DR

This vulnerability allows a physically proximate attacker to bypass tamper protection on Entrust hardware security modules, gaining debug access and privilege escalation by opening the chassis and accessing the JTAG connector without leaving evidence. It affects Entrust nShield Connect XC, nShield 5c, and nShield HSMi devices. Attackers can potentially extract cryptographic keys and compromise the HSM's security functions.

💻 Affected Systems

Products:
  • Entrust nShield Connect XC
  • Entrust nShield 5c
  • Entrust nShield HSMi
Versions: Through 13.6.11, or 13.7
Operating Systems: Not OS-dependent - hardware vulnerability
Default Config Vulnerable: ⚠️ Yes
Notes: All configurations of affected hardware versions are vulnerable. The vulnerability is in the Chassis Management Board hardware/tamper protection design.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the HSM, extraction of all cryptographic keys and sensitive data, unauthorized cryptographic operations, and permanent backdoor installation.

🟠

Likely Case

Physical attacker gains administrative access to the HSM, extracts some cryptographic keys, and performs unauthorized cryptographic operations.

🟢

If Mitigated

With proper physical security controls, the attack is prevented or detected through tamper evidence, limiting impact to physical access attempts.

🌐 Internet-Facing: LOW - This is a physical access vulnerability requiring proximity to the hardware.
🏢 Internal Only: HIGH - Physical access to data center or server rooms enables exploitation by insiders or intruders with physical access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires physical access, specialized tools (JTAG debugger), and knowledge of HSM internals, but the vulnerability bypasses tamper evidence making detection difficult.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not applicable - hardware vulnerability

Vendor Advisory: https://github.com/google/security-research/security/advisories/GHSA-6q4x-m86j-gfwj

Restart Required: No

Instructions:

Contact Entrust for hardware replacement or physical security guidance. This is a hardware design vulnerability requiring physical mitigation.

🔧 Temporary Workarounds

Enhanced Physical Security Controls

all

Implement strict physical access controls, surveillance, and tamper-evident seals beyond the vulnerable tamper labels.

Environmental Monitoring

all

Deploy environmental sensors (vibration, temperature, door access) to detect physical tampering attempts.

🧯 If You Can't Patch

  • Isolate affected HSMs in physically secure locations with restricted access and continuous monitoring.
  • Implement compensating controls: regular physical inspections, enhanced tamper-evident packaging, and consider hardware replacement if critical.

🔍 How to Verify

Check if Vulnerable:

Check device model and firmware version via HSM management interface or physical inspection of hardware labels.

Check Version:

Use HSM management tools: 'nfast status' or check via Entrust management console for firmware version.

Verify Fix Applied:

Verify with Entrust support about hardware replacements or physical security recommendations. No software fix exists.

📡 Detection & Monitoring

Log Indicators:

  • Physical tamper alerts (if functional), unexpected debug access logs, privilege escalation events in HSM logs

Network Indicators:

  • Unusual cryptographic operations, unexpected administrative access patterns

SIEM Query:

Search for: 'tamper event', 'physical security breach', 'debug access' in HSM logs combined with physical access logs

🔗 References

📤 Share & Export