CVE-2025-59702
📋 TL;DR
This vulnerability allows a physically proximate attacker with elevated privileges to falsify tamper events on Entrust nShield hardware security modules by accessing internal components. This could undermine the physical security monitoring of these critical cryptographic devices. Affected systems include Entrust nShield Connect XC, nShield 5c, and nShield HSMi devices.
💻 Affected Systems
- Entrust nShield Connect XC
- Entrust nShield 5c
- Entrust nShield HSMi
📦 What is this software?
Nshield Connect Xc Base Firmware by Entrust
Nshield Connect Xc Base Firmware by Entrust
Nshield Connect Xc High Firmware by Entrust
Nshield Connect Xc High Firmware by Entrust
Nshield Connect Xc Mid Firmware by Entrust
Nshield Connect Xc Mid Firmware by Entrust
⚠️ Risk & Real-World Impact
Worst Case
An attacker could disable tamper detection mechanisms, allowing undetected physical access to extract cryptographic keys or manipulate hardware, compromising the entire cryptographic infrastructure.
Likely Case
Malicious insiders or attackers with physical access could bypass tamper-evident features, potentially extracting sensitive cryptographic material without triggering security alerts.
If Mitigated
With proper physical security controls and access restrictions, the attack surface is significantly reduced, though the vulnerability remains present in the hardware.
🎯 Exploit Status
Exploitation requires physical access to hardware components and elevated system privileges. The vulnerability is documented in Google's security research advisory.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions after 13.6.11 and 13.7
Vendor Advisory: https://github.com/google/security-research/security/advisories/GHSA-6q4x-m86j-gfwj
Restart Required: Yes
Instructions:
1. Contact Entrust support for firmware updates. 2. Schedule maintenance window for HSM firmware update. 3. Apply firmware update following vendor instructions. 4. Verify tamper detection functionality post-update.
🔧 Temporary Workarounds
Enhanced Physical Security Controls
allImplement strict physical access controls to prevent unauthorized access to HSM hardware components.
Privilege Access Management
allRestrict administrative privileges to essential personnel only and implement multi-person control for physical access.
🧯 If You Can't Patch
- Implement enhanced physical security measures including surveillance, access logs, and tamper-evident seals
- Isolate HSMs in secure locations with strict access controls and multi-person authorization requirements
🔍 How to Verify
Check if Vulnerable:
Check firmware version via HSM management interface or command: nfkminfo -v
Check Version:
nfkminfo -v
Verify Fix Applied:
Verify firmware version is above 13.6.11 or 13.7, and test tamper detection mechanisms
📡 Detection & Monitoring
Log Indicators:
- Unexpected tamper event logs
- Physical access logs showing unauthorized entry
- HSM firmware version matches vulnerable range
Network Indicators:
- None - this is a physical hardware vulnerability
SIEM Query:
source="hsm_logs" AND (tamper_event="false_positive" OR version="13.6.11" OR version="13.7")