Cohesity Vulnerabilities
Comprehensive security vulnerability database for Cohesity products
5
0
5
0
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2025-67840 | 7.2 | This vulnerability allows an attacker with admin access to the Cohesity TranZman appliance to run any command on the system, effectively taking full control of it. The attacker can exploit this by intercepting and modifying legitimate requests, which means they need to be authenticated as an admin to trigger the issue. | cohesitytranzman | Exploit Available | about 1 month agoMar 3, 2026 |
| CVE-2025-63912 | 7.5 | This vulnerability allows attackers to easily decrypt sensitive data, including credentials, due to the use of a weak encryption method in the Cohesity TranZman Migration Appliance. To exploit this flaw, an attacker would need access to the encrypted data, making it critical to secure the environment where this appliance is used. | cohesitytranzman | Exploit Available | about 1 month agoMar 3, 2026 |
| CVE-2025-63911 | 7.2 | This vulnerability allows an attacker with valid login credentials to execute arbitrary commands on the Cohesity TranZman Migration Appliance, potentially leading to unauthorized access or control over the system. To exploit this, the attacker must first be authenticated, meaning they need to log in with a legitimate account. | cohesitytranzman | Exploit Available | about 1 month agoMar 3, 2026 |
| CVE-2025-63910 | 7.2 | This vulnerability allows attackers with Administrator privileges to upload a specially crafted file that can execute any code they want on the system. This means if an attacker gains admin access, they can take full control of the device and potentially compromise the entire network. | cohesitytranzman | Exploit Available | about 1 month agoMar 3, 2026 |
| CVE-2025-63909 | 7.8 | This vulnerability allows an attacker to gain root access on the Cohesity TranZman Migration Appliance, enabling them to read and write any files on the system. To exploit this, the attacker needs to have access to the specific component of the appliance where the flaw exists. | cohesitytranzman | Exploit Available | about 1 month agoMar 3, 2026 |
About Cohesity Security
This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Cohesity products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.
Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.