Full Disclosure mailing list archives

Cohesity TranZman Migration Appliance - 5 CVEs (command injection, LPE, unsigned patches, weak crypto)


From: GregD via Fulldisclosure <fulldisclosure () seclists org>
Date: Sun, 08 Mar 2026 11:18:05 +0000

Hi,

I'm disclosing five vulnerabilities discovered during an authorised 
security assessment of the Cohesity TranZman Migration Appliance 
(formerly Stone Ram TranZman), Release 4.0 Build 14614.

CVE-2025-67840 - Web API Command Injection (CVSS 7.2 High)
The /api/v1/scheduler/run and /api/v1/actions/run endpoints allow 
authenticated administrators to execute arbitrary commands as root by 
injecting into POST request parameters. Input is not properly sanitised 
before being passed to system commands.

CVE-2025-63911 - CLISH Command Injection (CVSS 7.2 High)
Multiple command injection vectors exist in the CLISH restricted shell, 
allowing authenticated users to escape the restricted environment and 
gain elevated command execution via local privilege escalation.

CVE-2025-63909 - Local Privilege Escalation (CVSS 7.2 High)
Incorrect access control in /opt/SRLtzm/bin/TapeDumper allows 
authenticated users to escalate privileges to root.

CVE-2025-63910 - Unsigned Patch Upload (CVSS 7.2 High)
The patch upload mechanism does not verify signatures, allowing remote 
code execution via crafted patch files.

CVE-2025-63912 - Weak Cryptography / Static XOR (CVSS 5.5 Medium)
The TranZman FTP service (port 55555/TCP) uses XOR with a static, 
hardcoded key instead of proper encryption. An attacker who can
observe network traffic can decrypt the entire control channel - 
exposing credentials, commands, and backup filenames - and forge or 
replay commands to retrieve or tamper with files in transit.

Affected versions: Release 4.0 Build 14614 including patch
TZM_1757588060_SEP2025_FULL.depot

Vendor timeline:
- 26 September 2025: Reported to Cohesity
- 20 October 2025: Cohesity confirmed patches available
- 25 December 2025: 90-day embargo ended
- 27 December 2025: Public disclosure

Patches: Apply TZM_patch_1.patch followed by
TZM_1760106063_OCT2025R2_FULL.depot. Contact Cohesity support
for the latest OVA with integrated fixes.

Full advisories with techincal details:
https://github.com/GregDurys/Cohesity-TranZman-CVEs

Individual advisories (Gists):
https://gist.github.com/GregDurys/ef7fc6a36646df927374bba8e7279270
https://gist.github.com/GregDurys/d402038147e36de5908159d9722072ef
https://gist.github.com/GregDurys/74c36c36bef81293a42022758f2736a9
https://gist.github.com/GregDurys/8b7a3022c04b6cee8c1e1af04f5671b2
https://gist.github.com/GregDurys/4c2765d76272cda64dfc78f7a75a9251

Regards,
Greg Durys

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/


Current thread: