CVE-2025-63911
Published: 03 March 2026
Summary
CVE-2025-63911 is a high-severity OS Command Injection (CWE-78) vulnerability in Cohesity Tranzman. Its CVSS base score is 7.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 45.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Authenticated remote OS command injection (CWE-78) directly enables exploitation of the public-facing appliance for initial access and arbitrary command execution via shell interpreters.
NVD Description
Cohesity TranZman Migration Appliance Release 4.0 Build 14614 was discovered to contain an authenticated command injection vulnerability.
Deeper analysisAI
CVE-2025-63911 is an authenticated command injection vulnerability (CWE-78) in Cohesity TranZman Migration Appliance Release 4.0 Build 14614. The issue allows injection of operating system commands through an authenticated interface. It carries a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) and was published on 2026-03-03T18:16:23.773.
A high-privileged user (PR:H) can exploit this vulnerability remotely over the network (AV:N) with low attack complexity (AC:L) and no user interaction required (UI:N). Successful exploitation enables arbitrary command execution on the appliance, resulting in high impacts to confidentiality, integrity, and availability (C:H/I:H/A:H) within the unchanged security scope (S:U).
Mitigation details, including any available patches or advisories, are provided in the following references: https://gist.github.com/GregDurys/8b7a3022c04b6cee8c1e1af04f5671b2 and https://github.com/GregDurys/Cohesity-TranZman-CVEs. Security practitioners should consult these sources for vendor-specific remediation guidance.
Details
- CWE(s)