Home

Description

Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allow a Physically Proximate Attacker to access the internal components of the appliance, without leaving tamper evidence. To exploit this, the attacker needs to remove the tamper label and all fixing screws from the device without damaging it. This is called an F14 attack.

PUBLISHED Reserved 2025-09-18 | Published 2025-12-02 | Updated 2025-12-03 | Assigner mitre

References

www.entrust.com/use-case/why-use-an-hsm

github.com/...search/security/advisories/GHSA-6q4x-m86j-gfwj

cve.org (CVE-2025-59703)

nvd.nist.gov (CVE-2025-59703)

Download JSON