CVE-2025-59701

4.1 MEDIUM

📋 TL;DR

This vulnerability allows physically proximate attackers with elevated privileges to read and modify the unencrypted SSD contents of affected Entrust nShield hardware security modules. This affects organizations using nShield Connect XC, nShield 5c, and nShield HSMi devices. The attack requires physical access and administrative privileges.

💻 Affected Systems

Products:
  • Entrust nShield Connect XC
  • Entrust nShield 5c
  • Entrust nShield HSMi
Versions: Through 13.6.11, or 13.7
Operating Systems: HSM firmware/embedded systems
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable as the SSD encryption is not enabled by default. Requires physical access to the hardware and elevated privileges.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of cryptographic keys, certificates, and sensitive data stored on the HSM, leading to data breaches, identity theft, and cryptographic system compromise.

🟠

Likely Case

Unauthorized access to sensitive configuration data and cryptographic materials by malicious insiders or attackers who gain physical access to data centers.

🟢

If Mitigated

Limited impact due to physical security controls preventing unauthorized access to hardware and privilege management restricting administrative access.

🌐 Internet-Facing: LOW - This vulnerability requires physical proximity to the hardware and cannot be exploited remotely over the network.
🏢 Internal Only: MEDIUM - While physical access is required, internal threats with data center access and elevated privileges could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires physical access to the hardware, disassembly or direct connection to the SSD, and elevated privileges on the system. No public exploit code has been identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 13.6.11 and 13.7

Vendor Advisory: https://github.com/google/security-research/security/advisories/GHSA-6q4x-m86j-gfwj

Restart Required: Yes

Instructions:

1. Contact Entrust support for firmware updates. 2. Apply the latest firmware version that addresses SSD encryption. 3. Reboot the HSM device after firmware update. 4. Verify encryption is enabled on the SSD.

🔧 Temporary Workarounds

Enable Physical Security Controls

all

Implement strict physical access controls to prevent unauthorized personnel from accessing HSM hardware.

Restrict Administrative Privileges

all

Limit administrative access to only trusted personnel who require physical access to the hardware.

🧯 If You Can't Patch

  • Implement enhanced physical security measures including locked cabinets, surveillance, and access logs for HSM devices
  • Rotate cryptographic keys and certificates stored on vulnerable HSMs and monitor for unauthorized usage

🔍 How to Verify

Check if Vulnerable:

Check firmware version via HSM management interface or CLI. If version is 13.6.11 or earlier, or exactly 13.7, the system is vulnerable.

Check Version:

Use HSM-specific management commands (varies by model) or check via Entrust nShield management interface

Verify Fix Applied:

Verify firmware version is updated beyond vulnerable versions and confirm SSD encryption is enabled through HSM diagnostic tools.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized physical access logs to server rooms
  • HSM firmware modification attempts
  • Unexpected HSM reboots or maintenance events

Network Indicators:

  • None - this is a physical access vulnerability

SIEM Query:

Search for physical access control system alerts showing unauthorized entry to HSM locations, combined with HSM administrative activity logs

🔗 References

📤 Share & Export