{"id":"CVE-2025-59702","details":"Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7, allow a physically proximate attacker with elevated privileges to falsify tamper events by accessing internal components.","aliases":["CVE-2025-59693","CVE-2025-59694","CVE-2025-59695","CVE-2025-59696","CVE-2025-59698","CVE-2025-59699","CVE-2025-59700","CVE-2025-59701","CVE-2025-59703","CVE-2025-59704","CVE-2025-59705","GHSA-6q4x-m86j-gfwj"],"modified":"2026-03-14T12:44:10.680978Z","published":"2025-12-02T15:15:55.917Z","related":["GHSA-6q4x-m86j-gfwj"],"references":[{"type":"WEB","url":"https://www.entrust.com/use-case/why-use-an-hsm"},{"type":"EVIDENCE","url":"https://github.com/google/security-research/security/advisories/GHSA-6q4x-m86j-gfwj"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"13.6.12"}]},{"events":[{"introduced":"13.7"},{"fixed":"13.9.0"}]},{"events":[{"introduced":"0"},{"fixed":"13.6.12"}]},{"events":[{"introduced":"13.7"},{"fixed":"13.9.0"}]},{"events":[{"introduced":"0"},{"fixed":"13.6.12"}]},{"events":[{"introduced":"13.7"},{"fixed":"13.9.0"}]},{"events":[{"introduced":"0"},{"fixed":"13.6.12"}]},{"events":[{"introduced":"13.7"},{"fixed":"13.9.0"}]},{"events":[{"introduced":"0"},{"fixed":"13.6.12"}]},{"events":[{"introduced":"13.7"},{"fixed":"13.9.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-59702.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"}]}