Tranzman Vulnerabilities

Security vulnerability tracking for Cohesity Tranzman

Last updated: Mar 3, 2026
Total CVEs

5

Critical

0

With Exploits

5

Last 30 Days

0

Vulnerability Timeline

5 vulnerabilities discovered over time for Tranzman

Severity Distribution

Critical0
0%
High5
100%
Medium0
0%
Low0
0%
DescriptionVendor / ProductExploit Status
CVE-2025-678407.2

This vulnerability allows an attacker with admin access to the Cohesity TranZman appliance to run any command on the system, effectively taking full control of it. The attacker can exploit this by intercepting and modifying legitimate requests, which means they need to be authenticated as an admin to trigger the issue.

cohesitytranzman
Exploit Available
about 1 month agoMar 3, 2026
CVE-2025-639127.5

This vulnerability allows attackers to easily decrypt sensitive data, including credentials, due to the use of a weak encryption method in the Cohesity TranZman Migration Appliance. To exploit this flaw, an attacker would need access to the encrypted data, making it critical to secure the environment where this appliance is used.

cohesitytranzman
Exploit Available
about 1 month agoMar 3, 2026
CVE-2025-639117.2

This vulnerability allows an attacker with valid login credentials to execute arbitrary commands on the Cohesity TranZman Migration Appliance, potentially leading to unauthorized access or control over the system. To exploit this, the attacker must first be authenticated, meaning they need to log in with a legitimate account.

cohesitytranzman
Exploit Available
about 1 month agoMar 3, 2026
CVE-2025-639107.2

This vulnerability allows attackers with Administrator privileges to upload a specially crafted file that can execute any code they want on the system. This means if an attacker gains admin access, they can take full control of the device and potentially compromise the entire network.

cohesitytranzman
Exploit Available
about 1 month agoMar 3, 2026
CVE-2025-639097.8

This vulnerability allows an attacker to gain root access on the Cohesity TranZman Migration Appliance, enabling them to read and write any files on the system. To exploit this, the attacker needs to have access to the specific component of the appliance where the flaw exists.

cohesitytranzman
Exploit Available
about 1 month agoMar 3, 2026

About Cohesity Tranzman Security

This page provides comprehensive security vulnerability tracking for Cohesity Tranzman. Our database includes all CVEs affecting this product, updated in real-time from official sources.

Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.

Security Recommendations

  • • Always keep Tranzman updated to the latest version
  • • Subscribe to security advisories from Cohesity
  • • Monitor this page for new vulnerabilities affecting your version
  • • Prioritize patching critical and high severity issues immediately