Search Results (13 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-59695 1 Entrust 3 Nshield 5c, Nshield Connect Xc, Nshield Hsmi 2025-12-04 9.8 Critical
Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allow a user with OS root access to alter firmware on the Chassis Management Board (without Authentication). This is called F04.
CVE-2025-59699 1 Entrust 3 Nshield 5c, Nshield Connect Xc, Nshield Hsmi 2025-12-04 6.8 Medium
Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allow a physically proximate attacker to escalate privileges by booting from a USB device with a valid root filesystem. This occurs because of insecure default settings in the Legacy GRUB Bootloader.
CVE-2025-59700 1 Entrust 3 Nshield 5c, Nshield Connect Xc, Nshield Hsmi 2025-12-04 N/A
Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allow a physically proximate attacker with root access to modify the Recovery Partition (because of a lack of integrity protection).
CVE-2025-59703 1 Entrust 3 Nshield 5c, Nshield Connect Xc, Nshield Hsmi 2025-12-04 9.1 Critical
Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allow a Physically Proximate Attacker to access the internal components of the appliance, without leaving tamper evidence. To exploit this, the attacker needs to remove the tamper label and all fixing screws from the device without damaging it. This is called an F14 attack.
CVE-2025-59704 1 Entrust 3 Nshield 5c, Nshield Connect Xc, Nshield Hsmi 2025-12-04 N/A
Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allow an attacker to gain access the the BIOS menu because is has no password.
CVE-2025-59705 1 Entrust 3 Nshield 5c, Nshield Connect Xc, Nshield Hsmi 2025-12-04 6.8 Medium
Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allow a Physically Proximate Attacker to Escalate Privileges by enabling the USB interface through chassis probe insertion during system boot, aka "Unauthorized Reactivation of the USB interface" or F01.
CVE-2025-59694 1 Entrust 3 Nshield 5c, Nshield Connect Xc, Nshield Hsmi 2025-12-04 6.8 Medium
The Chassis Management Board in Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allows a physically proximate attacker to persistently modify firmware and influence the (insecurely configured) appliance boot process. To exploit this, the attacker must modify the firmware via JTAG or perform an upgrade to the chassis management board firmware. This is called F03.
CVE-2025-59702 1 Entrust 3 Nshield 5c, Nshield Connect Xc, Nshield Hsmi 2025-12-04 7.2 High
Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allow a physically proximate attacker with elevated privileges to falsify tamper events by accessing internal components.
CVE-2025-59693 1 Entrust 3 Nshield 5c, Nshield Connect Xc, Nshield Hsmi 2025-12-04 9.8 Critical
The Chassis Management Board in Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allows a physically proximate attacker to obtain debug access and escalate privileges by bypassing the tamper label and opening the chassis without leaving evidence, and accessing the JTAG connector. This is called F02.
CVE-2025-59698 1 Entrust 3 Nshield 5c, Nshield Connect Xc, Nshield Hsmi 2025-12-04 6.8 Medium
Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, might allow a physically proximate attacker to gain access to the EOL legacy bootloader.
CVE-2025-59701 1 Entrust 3 Nshield 5c, Nshield Connect Xc, Nshield Hsmi 2025-12-04 4.1 Medium
Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allow a physically proximate attacker (with elevated privileges) to read and modify the Appliance SSD contents (because they are unencrypted).
CVE-2025-59696 1 Entrust 3 Nshield 5c, Nshield Connect Xc, Nshield Hsmi 2025-12-04 3.2 Low
Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allow a physically proximate attacker to modify or erase tamper events via the Chassis management board.
CVE-2025-59697 1 Entrust 3 Nshield 5c, Nshield Connect Xc, Nshield Hsmi 2025-12-04 7.2 High
Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allow a physically proximate attacker to escalate privileges by editing the Legacy GRUB bootloader configuration to start a root shell upon boot of the host OS. This is called F06.