A critical vulnerability in Thales payShield HSM firmware allows authenticated attackers with network adjacency to extract master encryption keys, potentially enabling decryption of stored payment card data across all tenant environments.
| Advisory ID | IDS-ADV-2026-0419 |
| Component | Thales payShield 10K / payShield 9000 — Hardware Security Module (HSM) |
| Affected Service | eMACH.ai Secure Key Management, Tokenization & Payment Data Storage |
| Attack Vector | Network / Adjacent — Authenticated API exploitation |
| Impact | Extraction of cryptographic master keys; potential compromise of PAN encryption across all tenant environments |
| Affected Versions | payShield firmware < 1.4a.9 (10K series); firmware < 2.3.1 (9000 series) |
| CVE Reference | CVE-2026-21847 (pending NVD publication) |
| Discovery | Intellect Design Arena — Advanced Threat Research Team |
| CVSS 4.0 Base | 9.1 (AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N) |
The vulnerability exists in the HSM's host command processing layer, specifically in the EI (Export Key) and A0 (Generate MAC) command implementations. A race condition in the firmware's command queue allows an authenticated caller to chain a sequence of EI commands with specially crafted key block headers that bypass the key usage enforcement logic.
Under normal operation, the HSM enforces key separation policies that prevent encryption keys from being exported in cleartext. However, when the command queue processes concurrent EI requests with conflicting key block protection method (KBPK) parameters, the firmware enters an inconsistent state where the export permission check references a stale key attribute structure. This allows a key flagged as NO_EXPORT to be exported under a known transport key.
EI commands targeting the Zone Master Key (ZMK), each with different KBPK parametersPERMITThis vulnerability affects the HSM firmware used in the eMACH.ai platform's secure key management subsystem. The HSM is responsible for generating, storing, and managing cryptographic keys used to encrypt Primary Account Numbers (PANs) and other cardholder data elements across all partner tenant environments.
A successful exploitation could result in the compromise of all payment card data encrypted under the affected HSM's key hierarchy. This represents a direct violation of PCI DSS Requirements 3.5.1 (Protection of Cryptographic Keys) and 3.6.1 (Key Management Procedures).
Review HSM audit logs for the following patterns. The presence of any of these indicators warrants immediate investigation:
Important: If you identify any of the above indicators in your environment, contact our incident response team immediately at ir@intellectdesign-security.com before proceeding with remediation. Premature key rotation without forensic preservation may destroy evidence needed for PCI DSS Requirement 12.10 incident response documentation.
| Endpoint | Risk |
|---|---|
/api/v2/hsm/key/export | Primary exploitation vector — EI command interface |
/api/v2/hsm/key/generate-mac | Secondary vector — A0 command can leak key material in MAC output |
/api/v2/hsm/session/create | Session establishment — monitor for anomalous auth patterns |
/api/v2/hsm/diagnostics | Information disclosure — firmware version and configuration exposure |
An emergency firmware patch (version 1.4a.9-hf1) has been developed and validated by our security team in coordination with Thales. Select your deployment method below to access the patch package and deployment instructions.
Choose the deployment method appropriate for your environment. All methods deliver the same firmware update package with integrity verification and rollback procedures.
| Discovered | February 28, 2026 — Intellect Design Arena Advanced Threat Research |
| Vendor Notified | March 3, 2026 — Thales Product Security (case #TPS-2026-0891) |
| Patch Developed | March 15, 2026 — Firmware 1.4a.9-hf1 validated |
| Partner Notification | March 21, 2026 — PCI DSS 12.9.2 advisory issued |
| Patch Deadline | March 28, 2026 — All partner environments |
| Public Disclosure | April 21, 2026 — Coordinated with Thales (90-day policy) |
For technical questions about this advisory or the remediation process, contact our Partner Security team: