Entrust nShield Connect XC, nShield 5c, and nShield HSMi...
Critical severity
Unreviewed
Published
Dec 2, 2025
to the GitHub Advisory Database
•
Updated Dec 3, 2025
Description
Published by the National Vulnerability Database
Dec 2, 2025
Published to the GitHub Advisory Database
Dec 2, 2025
Last updated
Dec 3, 2025
Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allow a Physically Proximate Attacker to access the internal components of the appliance, without leaving tamper evidence. To exploit this, the attacker needs to remove the tamper label and all fixing screws from the device without damaging it. This is called an F14 attack.
References