CVE-2025-59696

3.2 LOW

📋 TL;DR

This vulnerability allows a physically proximate attacker to modify or erase tamper event logs on Entrust nShield hardware security modules. Attackers with physical access to the device chassis management board can manipulate security event records. This affects organizations using vulnerable Entrust nShield HSM devices for cryptographic operations.

💻 Affected Systems

Products:
  • Entrust nShield Connect XC
  • Entrust nShield 5c
  • Entrust nShield HSMi
Versions: Through 13.6.11, or 13.7
Operating Systems: Not OS-dependent - hardware vulnerability
Default Config Vulnerable: ⚠️ Yes
Notes: All configurations of affected hardware versions are vulnerable. Requires physical access to chassis management board.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could erase evidence of physical tampering, allowing undetected hardware compromise that could lead to cryptographic key theft or manipulation.

🟠

Likely Case

Physical security event logs become unreliable, potentially hiding evidence of unauthorized physical access attempts.

🟢

If Mitigated

With proper physical security controls and monitoring, the impact is limited to potential loss of tamper event audit trail integrity.

🌐 Internet-Facing: LOW - Requires physical access to device chassis management board
🏢 Internal Only: MEDIUM - Physical access to data center or server room required

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires physical access to the device's chassis management board interface. No authentication required once physical access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 13.6.11 and 13.7

Vendor Advisory: https://github.com/google/security-research/security/advisories/GHSA-6q4x-m86j-gfwj

Restart Required: Yes

Instructions:

1. Contact Entrust support for firmware updates. 2. Schedule maintenance window. 3. Backup configuration and keys. 4. Apply firmware update. 5. Verify tamper event logging functionality.

🔧 Temporary Workarounds

Enhanced Physical Security Controls

all

Implement strict physical access controls to prevent unauthorized access to HSM devices

Tamper Event Monitoring

all

Implement independent monitoring of tamper events through external logging or security cameras

🧯 If You Can't Patch

  • Implement strict physical access controls with logging and surveillance for HSM locations
  • Deploy redundant tamper detection mechanisms independent of the vulnerable hardware

🔍 How to Verify

Check if Vulnerable:

Check firmware version via HSM management interface or command: nfkminfo -v

Check Version:

nfkminfo -v

Verify Fix Applied:

Verify firmware version is above 13.6.11 or 13.7, and test tamper event logging functionality

📡 Detection & Monitoring

Log Indicators:

  • Missing or modified tamper event logs
  • Unexpected gaps in security event timeline

Network Indicators:

  • Not applicable - physical access vulnerability

SIEM Query:

Search for: (event_source="nShield HSM" AND event_type="tamper") | stats count by hour | where count=0

🔗 References

📤 Share & Export