6.8

CVE-2025-59699

Exploit
Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allow a physically proximate attacker to escalate privileges by booting from a USB device with a valid root filesystem. This occurs because of insecure default settings in the Legacy GRUB Bootloader.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
EntrustNshield 5c Firmware Version < 13.6.12
   EntrustNshield 5c Version-
EntrustNshield 5c Firmware Version >= 13.7 < 13.9.0
   EntrustNshield 5c Version-
EntrustNshield Hsmi Firmware Version < 13.6.12
   EntrustNshield Hsmi Version-
EntrustNshield Hsmi Firmware Version >= 13.7 < 13.9.0
   EntrustNshield Hsmi Version-
EntrustNshield Connect Xc Base Firmware Version >= 13.7 < 13.9.0
   EntrustNshield Connect Xc Base Version-
EntrustNshield Connect Xc Mid Firmware Version < 13.6.12
   EntrustNshield Connect Xc Mid Version-
EntrustNshield Connect Xc Mid Firmware Version >= 13.7 < 13.9.0
   EntrustNshield Connect Xc Mid Version-
EntrustNshield Connect Xc High Firmware Version >= 13.7 < 13.9.0
   EntrustNshield Connect Xc High Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.052
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
134c704f-9b21-4f2e-91b3-4a467353bcc0 6.8 0.9 5.9
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-290 Authentication Bypass by Spoofing

This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.