Entrust nShield F03 Firmware Vulnerability

MEDIUM (6.8) No Patch (12 days)

Threat Intelligence

Low Risk
EPSS Score: 0.02% chance of exploitation (percentile: 6%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: No public exploits found

How we test →

What is it?

The Entrust nShield Connect XC, nShield 5c, and nShield HSMi are hardware security modules used to protect sensitive data. The Chassis Management Board in these devices allows a physically proximate attacker to persistently modify firmware and influence the appliance boot process, posing a significant risk to the secure storage of sensitive information.

Am I affected?

Entrust nShield Connect XC, nShield 5c, and nShield HSMi through 13.6.11, or 13.7.
Check with: jtag -l (requires physical access to the device)

Note: This vulnerability is specific to Entrust's hardware security modules and not related to software applications.

Affected Products

Entrust / nShield Connect XC

How to fix

  1. Contact Entrust directly for a patched version of the firmware.
  2. Immediate mitigations:
  3. Restrict network access to your nShield instance (firewall it from the public internet)
  4. Audit admin account activity for suspicious access patterns
  5. Monitor for unauthorized firmware modifications