CVE-2025-67840
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker with admin access to the Cohesity TranZman appliance to run any command on the system, effectively taking full control of it. The attacker can exploit this by intercepting and modifying legitimate requests, which means they need to be authenticated as an admin to trigger the issue.
Technical Description
Multiple authenticated OS command injection vulnerabilities exist in the Cohesity (formerly Stone Ram) TranZman 4.0 Build 14614 through TZM_1757588060_SEP2025_FULL.depot web application API endpoints (including Scheduler and Actions pages). The appliance directly concatenates user-controlled parameters into system commands without sufficient sanitisation, allowing an authenticated admin user to inject and execute arbitrary OS commands with root privileges. An attacker can intercept legitimate requests (e.g. during job creation or execution) using a proxy and modify parameters to include shell metacharacters, achieving remote code execution on the appliance. This completely bypasses the intended CLISH restricted shell confinement and results in full system compromise. The vulnerabilities persist in Release 4.0 Build 14614 including the latest patch (as of the time of testing) TZM_1757588060_SEP2025_FULL.depot.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 3, 2026
about 1 month ago
Last Modified
Mar 5, 2026
about 1 month ago
Vendor
cohesity
Product
tranzman
Related Vulnerabilities
This vulnerability allows attackers to easily decrypt sensitive data, including credentials, due to the use of a weak encryption method in the Cohesity TranZman Migration Appliance. To exploit this flaw, an attacker would need access to the encrypted data, making it critical to secure the environment where this appliance is used.
This vulnerability allows an attacker with valid login credentials to execute arbitrary commands on the Cohesity TranZman Migration Appliance, potentially leading to unauthorized access or control over the system. To exploit this, the attacker must first be authenticated, meaning they need to log in with a legitimate account.
This vulnerability allows attackers with Administrator privileges to upload a specially crafted file that can execute any code they want on the system. This means if an attacker gains admin access, they can take full control of the device and potentially compromise the entire network.
This vulnerability allows an attacker to gain root access on the Cohesity TranZman Migration Appliance, enabling them to read and write any files on the system. To exploit this, the attacker needs to have access to the specific component of the appliance where the flaw exists.