{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-20902","assignerOrgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","state":"PUBLISHED","assignerShortName":"icscert","dateReserved":"2026-02-05T16:55:52.415Z","datePublished":"2026-02-27T00:49:44.858Z","dateUpdated":"2026-03-03T01:25:09.389Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Copeland XWEB 300D PRO","vendor":"Copeland","versions":[{"lessThanOrEqual":"1.12.1","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","product":"Copeland XWEB 500D PRO","vendor":"Copeland","versions":[{"lessThanOrEqual":"1.12.1","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","product":"Copeland XWEB 500B PRO","vendor":"Copeland","versions":[{"lessThanOrEqual":"1.12.1","status":"affected","version":"0","versionType":"custom"}]}],"credits":[{"lang":"en","type":"finder","value":"Amir Zaltzman and Noam Moshe of Claroty Team82 reported this vulnerability to CISA."}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"An OS command injection \n\n\n\nvulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an \nauthenticated attacker to achieve remote code execution on the system by\n injecting malicious input into the map filename field during the map \nupload action of the parameters route."}],"value":"An OS command injection \n\n\n\nvulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an \nauthenticated attacker to achieve remote code execution on the system by\n injecting malicious input into the map filename field during the map \nupload action of the parameters route."}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-78","description":"CWE-78","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","shortName":"icscert","dateUpdated":"2026-02-27T00:49:44.858Z"},"references":[{"url":"https://webapps.copeland.com/Dixell/Pages/SystemSoftwareUpdate"},{"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-26-057-10"},{"url":"https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-057-10.json"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Copeland has provided a fix for the vulnerabilities and recommends users\n update the XWEB Pro to the latest version by going to their software \nupdate page \n<a target=\"_blank\" rel=\"nofollow\" href=\"https://webapps.copeland.com/Dixell/Pages/SystemSoftwareUpdate\">https://webapps.copeland.com/Dixell/Pages/SystemSoftwareUpdate</a> in the \nsections dedicated to the different XWEBPRO models page.\n\n<br>"}],"value":"Copeland has provided a fix for the vulnerabilities and recommends users\n update the XWEB Pro to the latest version by going to their software \nupdate page \n https://webapps.copeland.com/Dixell/Pages/SystemSoftwareUpdate  in the \nsections dedicated to the different XWEBPRO models page."},{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Alternatively, a user logged into an XWEB Pro with internet access can \nupdate XWEB Pro directly from Copeland servers via the menu SYSTEM -- \nUpdates | Network.\n\n<br>"}],"value":"Alternatively, a user logged into an XWEB Pro with internet access can \nupdate XWEB Pro directly from Copeland servers via the menu SYSTEM -- \nUpdates | Network."}],"source":{"advisory":"ICSA-26-057-10","discovery":"EXTERNAL"},"title":"Copeland XWEB and XWEB Pro OS Command Injection","x_generator":{"engine":"Vulnogram 0.5.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-03T01:24:51.064322Z","id":"CVE-2026-20902","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-03T01:25:09.389Z"}}]}}