The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-59703

CVE-2025-59703: Entrust Nshield 5c Auth Bypass Flaw

CVE-2025-59703 is an authentication bypass vulnerability in Entrust Nshield 5c Firmware that allows physically proximate attackers to access internal components without leaving tamper evidence through an F14 attack. This article covers technical details, affected versions, impact, and mitigation strategies.

Published: March 24, 2026

CVE-2025-59703 Overview

CVE-2025-59703 is a critical hardware vulnerability affecting Entrust nShield Hardware Security Module (HSM) devices, including the nShield Connect XC, nShield 5c, and nShield HSMi product lines through firmware version 13.6.11 and version 13.7. This vulnerability, known as an "F14 attack," allows a physically proximate attacker to access the internal components of the HSM appliance without leaving tamper evidence.

The vulnerability stems from improper access control (CWE-284) in the physical security design of the affected devices. An attacker with physical access to the device can remove the tamper label and all fixing screws without damaging them, thereby gaining access to internal components while circumventing tamper-evident mechanisms that are designed to detect unauthorized physical intrusion.

Critical Impact

Attackers with physical proximity can bypass HSM tamper-evident protections and access internal cryptographic components without detection, potentially compromising stored cryptographic keys and sensitive security operations.

Affected Products

  • Entrust nShield Connect XC (Base, Mid, High) firmware through 13.6.11 and 13.7
  • Entrust nShield 5c firmware through 13.6.11 and 13.7
  • Entrust nShield HSMi firmware through 13.6.11 and 13.7

Discovery Timeline

  • 2025-12-02 - CVE-2025-59703 published to NVD
  • 2025-12-08 - Last updated in NVD database

Technical Details for CVE-2025-59703

Vulnerability Analysis

This vulnerability represents a significant failure in physical security controls for HSM devices, which are specifically designed to protect high-value cryptographic keys and perform sensitive cryptographic operations. HSMs are certified under rigorous standards such as FIPS 140-2/3 and Common Criteria, where physical tamper-evidence is a core security requirement.

The F14 attack exploits weaknesses in the tamper-evident mechanisms of the affected Entrust nShield devices. Under normal circumstances, any attempt to physically access the internal components of an HSM should either destroy sensitive material (zeroization) or leave clear evidence of tampering. However, this vulnerability allows an attacker to circumvent these protections entirely.

The impact is severe because HSMs are trusted as the root of security in many critical infrastructures, including:

  • Public Key Infrastructure (PKI) and Certificate Authorities
  • Banking and payment processing systems
  • Government and defense cryptographic operations
  • Database encryption key management
  • Code signing infrastructure

Root Cause

The root cause is improper access control (CWE-284) in the physical security design of the device enclosure. The tamper label and fixing screws can be removed and replaced without causing visible damage or triggering tamper detection mechanisms. This design flaw allows an adversary to access the internal components, potentially extract or manipulate cryptographic material, and reassemble the device without leaving evidence of the intrusion.

Attack Vector

The attack requires physical proximity to the target HSM device. While the CVSS vector indicates a network attack vector, the actual exploitation requires hands-on physical access to the device. The attacker must:

  1. Gain physical access to the HSM device location (data center, server room, etc.)
  2. Carefully remove the tamper label without damaging it
  3. Remove all fixing screws from the device enclosure
  4. Access internal components to potentially extract cryptographic keys or implant malicious hardware
  5. Reassemble the device, replacing screws and tamper label

The vulnerability mechanism involves careful physical manipulation of the device's tamper-evident seals and enclosure. The attacker exploits the fact that the tamper label and screws can be removed and reinstalled without creating detectable evidence of the intrusion. For detailed technical information about this attack methodology, refer to the GitHub Security Advisory.

Detection Methods for CVE-2025-59703

Indicators of Compromise

  • Unexplained physical access logs or badge entries to HSM storage locations during off-hours
  • Subtle irregularities in tamper labels upon close visual inspection (microscopic damage, adhesive residue patterns)
  • Cryptographic operations behaving unexpectedly or producing anomalous results
  • Unauthorized firmware modifications or configuration changes detected during integrity verification

Detection Strategies

  • Implement secondary tamper-evident mechanisms such as additional security seals, tamper-evident enclosures, or serialized security tape
  • Deploy continuous video surveillance with motion detection in HSM storage areas
  • Conduct regular physical inspections of HSM devices using forensic-grade examination techniques
  • Maintain strict chain-of-custody documentation for all HSM hardware

Monitoring Recommendations

  • Enable and centrally aggregate all HSM audit logs for anomaly detection
  • Monitor for unusual patterns in cryptographic operations that could indicate key compromise
  • Implement environmental monitoring sensors (temperature, vibration, case intrusion) in HSM enclosures
  • Establish regular integrity verification schedules using cryptographic attestation where supported

How to Mitigate CVE-2025-59703

Immediate Actions Required

  • Contact Entrust support to determine if firmware updates or physical security enhancements are available for affected devices
  • Conduct immediate physical security audit of all deployed nShield HSM devices
  • Apply additional tamper-evident seals and document their placement with photographs
  • Review and restrict physical access controls to HSM locations
  • Consider key rotation if any physical security breach is suspected

Patch Information

At the time of publication, specific patch information has not been released by Entrust. Organizations should monitor the Entrust security advisories and contact Entrust support directly for guidance on available remediations or hardware replacements. The GitHub Security Advisory provides additional technical context for this vulnerability.

Workarounds

  • Place HSMs in additional tamper-evident enclosures or safes with independent monitoring
  • Implement dual-control access procedures requiring two authorized personnel for any physical access to HSM devices
  • Deploy motion-activated cameras and intrusion detection sensors in immediate proximity to HSM devices
  • Establish baseline documentation (photographs, serial numbers, seal positions) for all HSM devices to facilitate tamper detection
bash
# Example: Enhanced physical security audit logging configuration
# Document current tamper seal status and device integrity
echo "$(date -u +%Y-%m-%dT%H:%M:%SZ) - HSM Physical Audit" >> /var/log/hsm_audit.log
echo "Device: nShield Connect XC - Serial: [SERIAL_NUMBER]" >> /var/log/hsm_audit.log
echo "Tamper Seal Status: [INTACT/COMPROMISED]" >> /var/log/hsm_audit.log
echo "Secondary Seal Status: [INTACT/COMPROMISED]" >> /var/log/hsm_audit.log
echo "Inspector: [INSPECTOR_NAME] Witness: [WITNESS_NAME]" >> /var/log/hsm_audit.log

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechEntrust Nshield

  • SeverityCRITICAL

  • CVSS Score9.1

  • EPSS Probability0.05%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-284
  • Technical References
  • GitHub Security Advisory

  • Entrust HSM Use Case
  • Related CVEs
  • CVE-2025-59693: Entrust Nshield 5c Privilege Escalation

  • CVE-2025-59694: Entrust Nshield 5c Privilege Escalation

  • CVE-2025-59695: Entrust nShield 5c Firmware Escalation Flaw
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English