


Perceptive Security
SOC/SIEM Consultancy

Multiple authenticated OS command injection vulnerabilities exist in the Cohesity (formerly Stone Ram) TranZman 4.0 Build 14614 through TZM_1757588060_SEP2025_F…
Published:
2 March 2026 at 23:00:00
Alert date:
3 March 2026 at 19:02:51
Source:
nvd.nist.gov
Enterprise Applications, Web Technologies
Multiple authenticated OS command injection vulnerabilities exist in Cohesity TranZman 4.0 Build 14614 through latest patch TZM_1757588060_SEP2025_FULL.depot. The web application API endpoints directly concatenate user-controlled parameters into system commands without proper sanitization. Authenticated admin users can inject arbitrary OS commands with root privileges by intercepting requests and modifying parameters with shell metacharacters. This bypasses CLISH restricted shell confinement and results in complete system compromise including remote code execution.
Technical details
Mitigation steps:
Affected products:
Cohesity TranZman
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2025-67840
https://cohesity.com
https://gist.github.com/GregDurys/ef7fc6a36646df927374bba8e7279270
https://github.com/GregDurys/Cohesity-TranZman-CVEs
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
