The Chassis Management Board in Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allows a physically proximate attacker to obtain debug access and escalate privileges by bypassing the tamper label and opening the chassis without leaving evidence, and accessing the JTAG connector. This is called F02.
Metrics
Affected Vendors & Products
References
History
Wed, 03 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-269 | |
| Metrics |
cvssV3_1
|
Tue, 02 Dec 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Chassis Management Board in Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allows a physically proximate attacker to obtain debug access and escalate privileges by bypassing the tamper label and opening the chassis without leaving evidence, and accessing the JTAG connector. This is called F02. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-12-02T00:00:00.000Z
Updated: 2025-12-03T14:44:09.572Z
Reserved: 2025-09-18T00:00:00.000Z
Link: CVE-2025-59693
Updated: 2025-12-03T14:43:47.121Z
Status : Awaiting Analysis
Published: 2025-12-02T15:15:54.747
Modified: 2025-12-03T15:15:53.210
Link: CVE-2025-59693
No data.