CVE-2025-59704

4.6 MEDIUM

📋 TL;DR

This vulnerability allows physical attackers to access the BIOS menu on affected Entrust hardware security modules (HSMs) because the BIOS lacks password protection. Attackers with physical access could potentially compromise the device's firmware or boot process. This affects Entrust nShield Connect XC, nShield 5c, and nShield HSMi devices.

💻 Affected Systems

Products:
  • Entrust nShield Connect XC
  • Entrust nShield 5c
  • Entrust nShield HSMi
Versions: Through 13.6.11, or 13.7
Operating Systems: Not applicable - hardware vulnerability
Default Config Vulnerable: ⚠️ Yes
Notes: This is a hardware/firmware vulnerability affecting the BIOS configuration. Physical access to the device is required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with physical access could flash malicious firmware, extract cryptographic keys, or permanently compromise the HSM, potentially undermining all cryptographic operations it performs.

🟠

Likely Case

An attacker with brief physical access could modify BIOS settings to boot from unauthorized media or disable security features, potentially gaining persistent access to the device.

🟢

If Mitigated

With proper physical security controls, the impact is minimal as attackers cannot reach the devices.

🌐 Internet-Facing: LOW - This requires physical access to the device, not network access.
🏢 Internal Only: MEDIUM - Physical access within secure facilities could allow exploitation by malicious insiders or visitors.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires physical access to press BIOS keys during boot. No authentication or special tools needed beyond physical console access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 13.6.12 or later, 13.8 or later

Vendor Advisory: https://github.com/google/security-research/security/advisories/GHSA-6q4x-m86j-gfwj

Restart Required: Yes

Instructions:

1. Contact Entrust support for firmware updates. 2. Schedule maintenance window. 3. Apply firmware update following vendor instructions. 4. Verify BIOS password is set post-update.

🔧 Temporary Workarounds

Set BIOS Password

all

Manually set a BIOS password on affected devices to prevent unauthorized access

Access BIOS during boot (typically Del/F2/F10)
Navigate to Security settings
Set Supervisor Password

Physical Security Controls

all

Implement strict physical access controls to prevent unauthorized personnel from reaching HSM devices

🧯 If You Can't Patch

  • Implement enhanced physical security: locked racks, surveillance, access logs for HSM locations
  • Set BIOS passwords on all affected devices and document them securely

🔍 How to Verify

Check if Vulnerable:

1. Reboot device. 2. Press BIOS key during boot (typically Del/F2/F10). 3. If BIOS menu appears without password prompt, device is vulnerable.

Check Version:

Check firmware version via HSM management interface or console (vendor-specific commands)

Verify Fix Applied:

1. Reboot device. 2. Attempt to access BIOS. 3. Verify password prompt appears before BIOS menu access.

📡 Detection & Monitoring

Log Indicators:

  • Physical access logs showing unauthorized personnel near HSM devices
  • Unexpected device reboots or power cycles

Network Indicators:

  • None - this is a physical access vulnerability

SIEM Query:

Search for physical access control system alerts for HSM locations outside maintenance windows

🔗 References

📤 Share & Export