Cohesity Vulnerabilities

Comprehensive security vulnerability database for Cohesity products

Last updated: Mar 3, 2026
Total CVEs

5

Critical

0

With Exploits

5

Last 30 Days

0

Severity Distribution

Critical0
0%
High5
100%
Medium0
0%
Low0
0%
DescriptionVendor / ProductExploit Status
CVE-2025-678407.2

This vulnerability allows an attacker with admin access to the Cohesity TranZman appliance to run any command on the system, effectively taking full control of it. The attacker can exploit this by intercepting and modifying legitimate requests, which means they need to be authenticated as an admin to trigger the issue.

cohesitytranzman
Exploit Available
about 1 month agoMar 3, 2026
CVE-2025-639127.5

This vulnerability allows attackers to easily decrypt sensitive data, including credentials, due to the use of a weak encryption method in the Cohesity TranZman Migration Appliance. To exploit this flaw, an attacker would need access to the encrypted data, making it critical to secure the environment where this appliance is used.

cohesitytranzman
Exploit Available
about 1 month agoMar 3, 2026
CVE-2025-639117.2

This vulnerability allows an attacker with valid login credentials to execute arbitrary commands on the Cohesity TranZman Migration Appliance, potentially leading to unauthorized access or control over the system. To exploit this, the attacker must first be authenticated, meaning they need to log in with a legitimate account.

cohesitytranzman
Exploit Available
about 1 month agoMar 3, 2026
CVE-2025-639107.2

This vulnerability allows attackers with Administrator privileges to upload a specially crafted file that can execute any code they want on the system. This means if an attacker gains admin access, they can take full control of the device and potentially compromise the entire network.

cohesitytranzman
Exploit Available
about 1 month agoMar 3, 2026
CVE-2025-639097.8

This vulnerability allows an attacker to gain root access on the Cohesity TranZman Migration Appliance, enabling them to read and write any files on the system. To exploit this, the attacker needs to have access to the specific component of the appliance where the flaw exists.

cohesitytranzman
Exploit Available
about 1 month agoMar 3, 2026

About Cohesity Security

This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Cohesity products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.

Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.

Cohesity Security Vulnerabilities & CVEs | Trace Within | Trace Within