9.8

CVE-2025-59693

Exploit
The Chassis Management Board in Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allows a physically proximate attacker to obtain debug access and escalate privileges by bypassing the tamper label and opening the chassis without leaving evidence, and accessing the JTAG connector. This is called F02.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
EntrustNshield 5c Firmware Version < 13.6.12
   EntrustNshield 5c Version-
EntrustNshield 5c Firmware Version >= 13.7.3 < 13.9.0
   EntrustNshield 5c Version-
EntrustNshield Hsmi Firmware Version < 13.6.12
   EntrustNshield Hsmi Version-
EntrustNshield Hsmi Firmware Version >= 13.7.3 < 13.9.0
   EntrustNshield Hsmi Version-
EntrustNshield Connect Xc Base Firmware Version >= 13.7.3 < 13.9.0
   EntrustNshield Connect Xc Base Version-
EntrustNshield Connect Xc Mid Firmware Version < 13.6.12
   EntrustNshield Connect Xc Mid Version-
EntrustNshield Connect Xc Mid Firmware Version >= 13.7.3 < 13.9.0
   EntrustNshield Connect Xc Mid Version-
EntrustNshield Connect Xc High Firmware Version >= 13.7.3 < 13.9.0
   EntrustNshield Connect Xc High Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.08% 0.23
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
134c704f-9b21-4f2e-91b3-4a467353bcc0 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-269 Improper Privilege Management

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.