{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-25105","assignerOrgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","state":"PUBLISHED","assignerShortName":"icscert","dateReserved":"2026-02-05T16:47:16.532Z","datePublished":"2026-02-27T00:52:21.154Z","dateUpdated":"2026-03-02T12:47:45.130Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Copeland XWEB 300D PRO","vendor":"Copeland","versions":[{"lessThanOrEqual":"1.12.1","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","product":"Copeland XWEB 500D PRO","vendor":"Copeland","versions":[{"lessThanOrEqual":"1.12.1","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","product":"Copeland XWEB 500B PRO","vendor":"Copeland","versions":[{"lessThanOrEqual":"1.12.1","status":"affected","version":"0","versionType":"custom"}]}],"credits":[{"lang":"en","type":"finder","value":"Amir Zaltzman and Noam Moshe of Claroty Team82 reported this vulnerability to CISA."}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"An OS command injection \n\n\n\n\n\nvulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an \nauthenticated attacker to achieve remote code execution on the system by\n injecting malicious input into parameters of the Modbus command tool in\n the debug route."}],"value":"An OS command injection \n\n\n\n\n\nvulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an \nauthenticated attacker to achieve remote code execution on the system by\n injecting malicious input into parameters of the Modbus command tool in\n the debug route."}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-78","description":"CWE-78","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","shortName":"icscert","dateUpdated":"2026-02-27T00:52:21.154Z"},"references":[{"url":"https://webapps.copeland.com/Dixell/Pages/SystemSoftwareUpdate"},{"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-26-057-10"},{"url":"https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-057-10.json"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Copeland has provided a fix for the vulnerabilities and recommends users\n update the XWEB Pro to the latest version by going to their software \nupdate page \n<a target=\"_blank\" rel=\"nofollow\" href=\"https://webapps.copeland.com/Dixell/Pages/SystemSoftwareUpdate\">https://webapps.copeland.com/Dixell/Pages/SystemSoftwareUpdate</a> in the \nsections dedicated to the different XWEBPRO models page.\n\n<br>"}],"value":"Copeland has provided a fix for the vulnerabilities and recommends users\n update the XWEB Pro to the latest version by going to their software \nupdate page \n https://webapps.copeland.com/Dixell/Pages/SystemSoftwareUpdate  in the \nsections dedicated to the different XWEBPRO models page."},{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Alternatively, a user logged into an XWEB Pro with internet access can \nupdate XWEB Pro directly from Copeland servers via the menu SYSTEM -- \nUpdates | Network.\n\n<br>"}],"value":"Alternatively, a user logged into an XWEB Pro with internet access can \nupdate XWEB Pro directly from Copeland servers via the menu SYSTEM -- \nUpdates | Network."}],"source":{"advisory":"ICSA-26-057-10","discovery":"EXTERNAL"},"title":"Copeland XWEB and XWEB Pro OS Command Injection","x_generator":{"engine":"Vulnogram 0.5.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-02T12:47:30.692019Z","id":"CVE-2026-25105","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-02T12:47:45.130Z"}}]}}