top of page
perceptive_background_267k.jpg

Multiple authenticated OS command injection vulnerabilities exist in the Cohesity (formerly Stone Ram) TranZman 4.0 Build 14614 through TZM_1757588060_SEP2025_F…

Published:

2 maart 2026 om 23:00:00

Alert date:

3 maart 2026 om 19:02:51

Source:

nvd.nist.gov

Click to open the original link from this advisory

Enterprise Applications, Web Technologies

Multiple authenticated OS command injection vulnerabilities exist in Cohesity TranZman 4.0 Build 14614 through latest patch TZM_1757588060_SEP2025_FULL.depot. The web application API endpoints directly concatenate user-controlled parameters into system commands without proper sanitization. Authenticated admin users can inject arbitrary OS commands with root privileges by intercepting requests and modifying parameters with shell metacharacters. This bypasses CLISH restricted shell confinement and results in complete system compromise including remote code execution.

Technical details

Mitigation steps:

Affected products:

Cohesity TranZman

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page