Full Disclosure mailing list archives
Cohesity TranZman Migration Appliance - 5 CVEs (command injection, LPE, unsigned patches, weak crypto)
From: GregD via Fulldisclosure <fulldisclosure () seclists org>
Date: Sun, 08 Mar 2026 11:18:05 +0000
Hi, I'm disclosing five vulnerabilities discovered during an authorised security assessment of the Cohesity TranZman Migration Appliance (formerly Stone Ram TranZman), Release 4.0 Build 14614. CVE-2025-67840 - Web API Command Injection (CVSS 7.2 High) The /api/v1/scheduler/run and /api/v1/actions/run endpoints allow authenticated administrators to execute arbitrary commands as root by injecting into POST request parameters. Input is not properly sanitised before being passed to system commands. CVE-2025-63911 - CLISH Command Injection (CVSS 7.2 High) Multiple command injection vectors exist in the CLISH restricted shell, allowing authenticated users to escape the restricted environment and gain elevated command execution via local privilege escalation. CVE-2025-63909 - Local Privilege Escalation (CVSS 7.2 High) Incorrect access control in /opt/SRLtzm/bin/TapeDumper allows authenticated users to escalate privileges to root. CVE-2025-63910 - Unsigned Patch Upload (CVSS 7.2 High) The patch upload mechanism does not verify signatures, allowing remote code execution via crafted patch files. CVE-2025-63912 - Weak Cryptography / Static XOR (CVSS 5.5 Medium) The TranZman FTP service (port 55555/TCP) uses XOR with a static, hardcoded key instead of proper encryption. An attacker who can observe network traffic can decrypt the entire control channel - exposing credentials, commands, and backup filenames - and forge or replay commands to retrieve or tamper with files in transit. Affected versions: Release 4.0 Build 14614 including patch TZM_1757588060_SEP2025_FULL.depot Vendor timeline: - 26 September 2025: Reported to Cohesity - 20 October 2025: Cohesity confirmed patches available - 25 December 2025: 90-day embargo ended - 27 December 2025: Public disclosure Patches: Apply TZM_patch_1.patch followed by TZM_1760106063_OCT2025R2_FULL.depot. Contact Cohesity support for the latest OVA with integrated fixes. Full advisories with techincal details: https://github.com/GregDurys/Cohesity-TranZman-CVEs Individual advisories (Gists): https://gist.github.com/GregDurys/ef7fc6a36646df927374bba8e7279270 https://gist.github.com/GregDurys/d402038147e36de5908159d9722072ef https://gist.github.com/GregDurys/74c36c36bef81293a42022758f2736a9 https://gist.github.com/GregDurys/8b7a3022c04b6cee8c1e1af04f5671b2 https://gist.github.com/GregDurys/4c2765d76272cda64dfc78f7a75a9251 Regards, Greg Durys _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: https://seclists.org/fulldisclosure/
Current thread:
- Cohesity TranZman Migration Appliance - 5 CVEs (command injection, LPE, unsigned patches, weak crypto) GregD via Fulldisclosure (Mar 12)
