PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-3037 Copeland CVE debrief

CVE-2026-3037 is an authenticated OS command injection issue in Copeland XWEB Pro. According to CISA’s advisory, malicious input placed into the MBird SMS service URL and/or code via a utility route can be processed during system setup and lead to remote code execution. The vendor has provided a fix and recommends updating to the latest version.

Vendor
Copeland
Product
XWEB 300D PRO
CVSS
HIGH 8
CISA KEV
Not listed in stored evidence
Original CVE published
2026-02-26
Original CVE updated
2026-02-26
Advisory published
2026-02-26
Advisory updated
2026-02-26

Who should care

OT/ICS operators, facility teams, and administrators responsible for Copeland XWEB/XWEB Pro systems should prioritize this issue, especially for XWEB Pro 1.12.1 and earlier. Because the flaw can lead to remote code execution on an industrial system after authentication, it deserves prompt patching and review of management access.

Technical summary

CISA’s CSAF advisory describes an OS command injection vulnerability in XWEB Pro version 1.12.1 and prior. The issue is triggered when an authenticated attacker modifies malicious input injected into the MBird SMS service URL and/or code through a utility route; that input is later processed during system setup and can result in remote code execution. The advisory’s CVSS vector is AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H, indicating high impact with privileged access required.

Defensive priority

High — authenticated remote code execution on an industrial platform warrants immediate remediation.

Recommended defensive actions

  • Update XWEB Pro to the latest vendor-fixed version using Copeland’s software update page.
  • If the device has internet access and you have valid login access, use SYSTEM -- Updates | Network to update directly from Copeland servers.
  • Inventory XWEB Pro assets and confirm whether any deployed systems are at version 1.12.1 or earlier.
  • Review and limit administrative access to affected management and utility functions until patching is complete.

Evidence notes

Primary source is CISA CSAF advisory ICSA-26-057-10, published and modified on 2026-02-26. The advisory states the vulnerability affects XWEB Pro version 1.12.1 and prior and can lead to remote code execution for an authenticated attacker by modifying input in the MBird SMS service URL and/or code via a utility route processed during setup. The source also includes SSVCv2 notation dated 2026-02-25. The provided vendor metadata is low-confidence and includes mixed product naming; the CISA advisory title and remediation guidance should be treated as the authoritative scope reference.

Official resources

CISA published the advisory and CVE record on 2026-02-26 UTC.