Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allow a Physically Proximate Attacker to access the internal components of the appliance, without leaving tamper evidence. To exploit this, the attacker needs to remove the tamper label and all fixing screws from the device without damaging it. This is called an F14 attack.
Metrics
Affected Vendors & Products
References
History
Wed, 03 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-284 | |
| Metrics |
cvssV3_1
|
Tue, 02 Dec 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allow a Physically Proximate Attacker to access the internal components of the appliance, without leaving tamper evidence. To exploit this, the attacker needs to remove the tamper label and all fixing screws from the device without damaging it. This is called an F14 attack. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-12-02T00:00:00.000Z
Updated: 2025-12-03T14:50:00.869Z
Reserved: 2025-09-18T00:00:00.000Z
Link: CVE-2025-59703
Updated: 2025-12-03T14:49:28.359Z
Status : Awaiting Analysis
Published: 2025-12-02T16:15:55.317
Modified: 2025-12-03T15:15:53.760
Link: CVE-2025-59703
No data.