5
0
5
0
Vulnerability Timeline
5 vulnerabilities discovered over time for Tranzman
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2025-67840 | 7.2 | This vulnerability allows an attacker with admin access to the Cohesity TranZman appliance to run any command on the system, effectively taking full control of it. The attacker can exploit this by intercepting and modifying legitimate requests, which means they need to be authenticated as an admin to trigger the issue. | cohesitytranzman | Exploit Available | about 1 month agoMar 3, 2026 |
| CVE-2025-63912 | 7.5 | This vulnerability allows attackers to easily decrypt sensitive data, including credentials, due to the use of a weak encryption method in the Cohesity TranZman Migration Appliance. To exploit this flaw, an attacker would need access to the encrypted data, making it critical to secure the environment where this appliance is used. | cohesitytranzman | Exploit Available | about 1 month agoMar 3, 2026 |
| CVE-2025-63911 | 7.2 | This vulnerability allows an attacker with valid login credentials to execute arbitrary commands on the Cohesity TranZman Migration Appliance, potentially leading to unauthorized access or control over the system. To exploit this, the attacker must first be authenticated, meaning they need to log in with a legitimate account. | cohesitytranzman | Exploit Available | about 1 month agoMar 3, 2026 |
| CVE-2025-63910 | 7.2 | This vulnerability allows attackers with Administrator privileges to upload a specially crafted file that can execute any code they want on the system. This means if an attacker gains admin access, they can take full control of the device and potentially compromise the entire network. | cohesitytranzman | Exploit Available | about 1 month agoMar 3, 2026 |
| CVE-2025-63909 | 7.8 | This vulnerability allows an attacker to gain root access on the Cohesity TranZman Migration Appliance, enabling them to read and write any files on the system. To exploit this, the attacker needs to have access to the specific component of the appliance where the flaw exists. | cohesitytranzman | Exploit Available | about 1 month agoMar 3, 2026 |
About Cohesity Tranzman Security
This page provides comprehensive security vulnerability tracking for Cohesity Tranzman. Our database includes all CVEs affecting this product, updated in real-time from official sources.
Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.
Security Recommendations
- • Always keep Tranzman updated to the latest version
- • Subscribe to security advisories from Cohesity
- • Monitor this page for new vulnerabilities affecting your version
- • Prioritize patching critical and high severity issues immediately