CVE-2025-59694
📋 TL;DR
This vulnerability allows a physically proximate attacker to persistently modify firmware on Entrust nShield HSM chassis management boards, potentially compromising the appliance boot process. Attackers can exploit this via JTAG interface manipulation or firmware upgrades. Affected systems include Entrust nShield Connect XC, nShield 5c, and nShield HSMi devices.
💻 Affected Systems
- Entrust nShield Connect XC
- Entrust nShield 5c
- Entrust nShield HSMi
📦 What is this software?
Nshield Connect Xc Base Firmware by Entrust
Nshield Connect Xc Base Firmware by Entrust
Nshield Connect Xc High Firmware by Entrust
Nshield Connect Xc High Firmware by Entrust
Nshield Connect Xc Mid Firmware by Entrust
Nshield Connect Xc Mid Firmware by Entrust
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of HSM security, allowing persistent backdoors, firmware manipulation, and potential extraction of cryptographic keys or tampering with cryptographic operations.
Likely Case
Physical attackers gaining unauthorized access to modify firmware, potentially disrupting HSM operations or establishing persistence for future attacks.
If Mitigated
Limited impact with proper physical security controls preventing unauthorized physical access to HSM devices.
🎯 Exploit Status
Exploitation requires physical access and JTAG interface knowledge or ability to perform firmware upgrades. Referred to as F03 vulnerability.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions after 13.6.11 and 13.7
Vendor Advisory: https://github.com/google/security-research/security/advisories/GHSA-6q4x-m86j-gfwj
Restart Required: Yes
Instructions:
1. Contact Entrust support for firmware updates. 2. Apply chassis management board firmware update. 3. Reboot the HSM appliance. 4. Verify firmware version is updated beyond vulnerable versions.
🔧 Temporary Workarounds
Physical Security Enhancement
allStrengthen physical access controls to prevent unauthorized physical access to HSM devices.
JTAG Interface Disablement
allPhysically disable or secure JTAG interfaces if not required for maintenance.
🧯 If You Can't Patch
- Implement strict physical security controls with access logging and monitoring
- Restrict firmware upgrade capabilities to authorized personnel only
🔍 How to Verify
Check if Vulnerable:
Check chassis management board firmware version via HSM management interface or console. Versions through 13.6.11 or 13.7 are vulnerable.
Check Version:
Use Entrust nShield management tools or console commands specific to your HSM model to check firmware version.
Verify Fix Applied:
Verify firmware version is updated beyond 13.6.11 or 13.7 through HSM management interface.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized physical access logs
- Unexpected firmware modification events
- JTAG interface access attempts
Network Indicators:
- Unusual management interface activity
- Unexpected firmware update traffic
SIEM Query:
Search for physical access violations OR firmware modification events on HSM devices