CVE-2025-59695

9.8 CRITICAL

📋 TL;DR

This vulnerability allows users with root access to the operating system to modify firmware on the Chassis Management Board without authentication. This affects Entrust nShield Connect XC, nShield 5c, and nShield HSMi hardware security modules. Attackers with root privileges can potentially compromise the hardware security module's management interface.

💻 Affected Systems

Products:
  • Entrust nShield Connect XC
  • Entrust nShield 5c
  • Entrust nShield HSMi
Versions: Through 13.6.11 or 13.7
Operating Systems: All supported OS for these HSMs
Default Config Vulnerable: ⚠️ Yes
Notes: Requires root access to the host system where the HSM is connected. The vulnerability is in the firmware update mechanism for the Chassis Management Board.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with root access could install malicious firmware on the Chassis Management Board, potentially gaining persistent control over the HSM, extracting cryptographic keys, or disabling security functions entirely.

🟠

Likely Case

Malicious insiders or attackers who have already gained root access could modify firmware to establish persistence, bypass security controls, or exfiltrate sensitive cryptographic material.

🟢

If Mitigated

With proper access controls limiting root access and network segmentation, the attack surface is significantly reduced, though the vulnerability remains present in the firmware.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires root access to the host system. The vulnerability is in the firmware update process (referred to as F04) which doesn't require authentication once root access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 13.6.11 and 13.7

Vendor Advisory: https://github.com/google/security-research/security/advisories/GHSA-6q4x-m86j-gfwj

Restart Required: Yes

Instructions:

1. Contact Entrust support for firmware updates. 2. Schedule maintenance window for HSM firmware update. 3. Backup all cryptographic keys and configurations. 4. Apply firmware update following vendor instructions. 5. Verify firmware version after update. 6. Restore keys and configurations if needed.

🔧 Temporary Workarounds

Restrict Root Access

all

Implement strict access controls to prevent unauthorized users from obtaining root privileges on systems connected to HSMs.

# Implement sudo restrictions
# Use privilege access management
# Enforce multi-factor authentication for administrative access

Network Segmentation

all

Isolate HSM management interfaces from general network access and restrict to authorized management systems only.

# Configure firewall rules to restrict access to HSM management ports
# Implement VLAN segmentation for HSM networks

🧯 If You Can't Patch

  • Implement strict access controls and monitoring for root access on all systems connected to affected HSMs
  • Isolate HSM management networks and implement network-based intrusion detection for anomalous firmware update attempts

🔍 How to Verify

Check if Vulnerable:

Check HSM firmware version using vendor-specific tools or management interfaces. Versions through 13.6.11 or 13.7 are vulnerable.

Check Version:

Use vendor-specific commands: nfkminfo or equivalent HSM management utilities to check firmware version

Verify Fix Applied:

Verify firmware version is updated beyond 13.6.11 or 13.7 using vendor management tools or command-line interfaces.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected firmware update attempts
  • Root access to HSM-connected systems outside maintenance windows
  • Failed authentication attempts followed by successful root access

Network Indicators:

  • Firmware update traffic to HSM management interfaces outside scheduled maintenance
  • Unauthorized access attempts to HSM management ports

SIEM Query:

source="hsm_logs" AND (event_type="firmware_update" OR event_type="root_access") AND NOT maintenance_window=true

🔗 References

📤 Share & Export