{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-3037","assignerOrgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","state":"PUBLISHED","assignerShortName":"icscert","dateReserved":"2026-02-23T16:21:11.631Z","datePublished":"2026-02-27T01:06:42.223Z","dateUpdated":"2026-02-27T19:09:35.935Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Copeland XWEB 300D PRO","vendor":"Copeland","versions":[{"lessThanOrEqual":"1.12.1","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","product":"Copeland XWEB 500D PRO","vendor":"Copeland","versions":[{"lessThanOrEqual":"1.12.1","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","product":"Copeland XWEB 500B PRO","vendor":"Copeland","versions":[{"lessThanOrEqual":"1.12.1","status":"affected","version":"0","versionType":"custom"}]}],"credits":[{"lang":"en","type":"finder","value":"Amir Zaltzman and Noam Moshe of Claroty Team82 reported this vulnerability to CISA."}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"An OS command injection vulnerability exists in XWEB Pro version 1.12.1 \nand prior, enabling an authenticated attacker to achieve remote code \nexecution on the system by modifying malicious input injected into the \nMBird SMS service URL and/or code via the utility route which is later \nprocessed during system setup, leading to remote code execution."}],"value":"An OS command injection vulnerability exists in XWEB Pro version 1.12.1 \nand prior, enabling an authenticated attacker to achieve remote code \nexecution on the system by modifying malicious input injected into the \nMBird SMS service URL and/or code via the utility route which is later \nprocessed during system setup, leading to remote code execution."}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-78","description":"CWE-78","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","shortName":"icscert","dateUpdated":"2026-02-27T01:06:42.223Z"},"references":[{"url":"https://webapps.copeland.com/Dixell/Pages/SystemSoftwareUpdate"},{"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-26-057-10"},{"url":"https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-057-10.json"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Copeland has provided a fix for the vulnerabilities and recommends users\n update the XWEB Pro to the latest version by going to their software \nupdate page \n<a target=\"_blank\" rel=\"nofollow\" href=\"https://webapps.copeland.com/Dixell/Pages/SystemSoftwareUpdate\">https://webapps.copeland.com/Dixell/Pages/SystemSoftwareUpdate</a> in the \nsections dedicated to the different XWEBPRO models page.\n\n<br>"}],"value":"Copeland has provided a fix for the vulnerabilities and recommends users\n update the XWEB Pro to the latest version by going to their software \nupdate page \n https://webapps.copeland.com/Dixell/Pages/SystemSoftwareUpdate  in the \nsections dedicated to the different XWEBPRO models page."},{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Alternatively, a user logged into an XWEB Pro with internet access can \nupdate XWEB Pro directly from Copeland servers via the menu SYSTEM -- \nUpdates | Network.\n\n<br>"}],"value":"Alternatively, a user logged into an XWEB Pro with internet access can \nupdate XWEB Pro directly from Copeland servers via the menu SYSTEM -- \nUpdates | Network."}],"source":{"advisory":"ICSA-26-057-10","discovery":"EXTERNAL"},"title":"Copeland XWEB and XWEB Pro OS Command Injection","x_generator":{"engine":"Vulnogram 0.5.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-27T19:09:29.232913Z","id":"CVE-2026-3037","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-27T19:09:35.935Z"}}]}}