CVE-2025-59703 Overview
CVE-2025-59703 is a critical hardware vulnerability affecting Entrust nShield Hardware Security Module (HSM) devices, including the nShield Connect XC, nShield 5c, and nShield HSMi product lines through firmware version 13.6.11 and version 13.7. This vulnerability, known as an "F14 attack," allows a physically proximate attacker to access the internal components of the HSM appliance without leaving tamper evidence.
The vulnerability stems from improper access control (CWE-284) in the physical security design of the affected devices. An attacker with physical access to the device can remove the tamper label and all fixing screws without damaging them, thereby gaining access to internal components while circumventing tamper-evident mechanisms that are designed to detect unauthorized physical intrusion.
Critical Impact
Attackers with physical proximity can bypass HSM tamper-evident protections and access internal cryptographic components without detection, potentially compromising stored cryptographic keys and sensitive security operations.
Affected Products
- Entrust nShield Connect XC (Base, Mid, High) firmware through 13.6.11 and 13.7
- Entrust nShield 5c firmware through 13.6.11 and 13.7
- Entrust nShield HSMi firmware through 13.6.11 and 13.7
Discovery Timeline
- 2025-12-02 - CVE-2025-59703 published to NVD
- 2025-12-08 - Last updated in NVD database
Technical Details for CVE-2025-59703
Vulnerability Analysis
This vulnerability represents a significant failure in physical security controls for HSM devices, which are specifically designed to protect high-value cryptographic keys and perform sensitive cryptographic operations. HSMs are certified under rigorous standards such as FIPS 140-2/3 and Common Criteria, where physical tamper-evidence is a core security requirement.
The F14 attack exploits weaknesses in the tamper-evident mechanisms of the affected Entrust nShield devices. Under normal circumstances, any attempt to physically access the internal components of an HSM should either destroy sensitive material (zeroization) or leave clear evidence of tampering. However, this vulnerability allows an attacker to circumvent these protections entirely.
The impact is severe because HSMs are trusted as the root of security in many critical infrastructures, including:
- Public Key Infrastructure (PKI) and Certificate Authorities
- Banking and payment processing systems
- Government and defense cryptographic operations
- Database encryption key management
- Code signing infrastructure
Root Cause
The root cause is improper access control (CWE-284) in the physical security design of the device enclosure. The tamper label and fixing screws can be removed and replaced without causing visible damage or triggering tamper detection mechanisms. This design flaw allows an adversary to access the internal components, potentially extract or manipulate cryptographic material, and reassemble the device without leaving evidence of the intrusion.
Attack Vector
The attack requires physical proximity to the target HSM device. While the CVSS vector indicates a network attack vector, the actual exploitation requires hands-on physical access to the device. The attacker must:
- Gain physical access to the HSM device location (data center, server room, etc.)
- Carefully remove the tamper label without damaging it
- Remove all fixing screws from the device enclosure
- Access internal components to potentially extract cryptographic keys or implant malicious hardware
- Reassemble the device, replacing screws and tamper label
The vulnerability mechanism involves careful physical manipulation of the device's tamper-evident seals and enclosure. The attacker exploits the fact that the tamper label and screws can be removed and reinstalled without creating detectable evidence of the intrusion. For detailed technical information about this attack methodology, refer to the GitHub Security Advisory.
Detection Methods for CVE-2025-59703
Indicators of Compromise
- Unexplained physical access logs or badge entries to HSM storage locations during off-hours
- Subtle irregularities in tamper labels upon close visual inspection (microscopic damage, adhesive residue patterns)
- Cryptographic operations behaving unexpectedly or producing anomalous results
- Unauthorized firmware modifications or configuration changes detected during integrity verification
Detection Strategies
- Implement secondary tamper-evident mechanisms such as additional security seals, tamper-evident enclosures, or serialized security tape
- Deploy continuous video surveillance with motion detection in HSM storage areas
- Conduct regular physical inspections of HSM devices using forensic-grade examination techniques
- Maintain strict chain-of-custody documentation for all HSM hardware
Monitoring Recommendations
- Enable and centrally aggregate all HSM audit logs for anomaly detection
- Monitor for unusual patterns in cryptographic operations that could indicate key compromise
- Implement environmental monitoring sensors (temperature, vibration, case intrusion) in HSM enclosures
- Establish regular integrity verification schedules using cryptographic attestation where supported
How to Mitigate CVE-2025-59703
Immediate Actions Required
- Contact Entrust support to determine if firmware updates or physical security enhancements are available for affected devices
- Conduct immediate physical security audit of all deployed nShield HSM devices
- Apply additional tamper-evident seals and document their placement with photographs
- Review and restrict physical access controls to HSM locations
- Consider key rotation if any physical security breach is suspected
Patch Information
At the time of publication, specific patch information has not been released by Entrust. Organizations should monitor the Entrust security advisories and contact Entrust support directly for guidance on available remediations or hardware replacements. The GitHub Security Advisory provides additional technical context for this vulnerability.
Workarounds
- Place HSMs in additional tamper-evident enclosures or safes with independent monitoring
- Implement dual-control access procedures requiring two authorized personnel for any physical access to HSM devices
- Deploy motion-activated cameras and intrusion detection sensors in immediate proximity to HSM devices
- Establish baseline documentation (photographs, serial numbers, seal positions) for all HSM devices to facilitate tamper detection
# Example: Enhanced physical security audit logging configuration
# Document current tamper seal status and device integrity
echo "$(date -u +%Y-%m-%dT%H:%M:%SZ) - HSM Physical Audit" >> /var/log/hsm_audit.log
echo "Device: nShield Connect XC - Serial: [SERIAL_NUMBER]" >> /var/log/hsm_audit.log
echo "Tamper Seal Status: [INTACT/COMPROMISED]" >> /var/log/hsm_audit.log
echo "Secondary Seal Status: [INTACT/COMPROMISED]" >> /var/log/hsm_audit.log
echo "Inspector: [INSPECTOR_NAME] Witness: [WITNESS_NAME]" >> /var/log/hsm_audit.log
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


