Description
A vulnerability exists in Copeland XWEB Pro version 1.12.1 and prior, in
which an unexpected return value from the authentication routine is
later on processed as a legitimate value, resulting in an authentication
bypass.
Published: 2026-02-27
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Authentication Bypass
Action: Patch Now
AI Analysis

Impact

A fault in Copeland XWEB Pro firmware versions 1.12.1 and earlier allows an authentication bypass. The logic incorrectly interprets an unexpected return value from the authentication routine as a valid credential, enabling an attacker to gain unauthorized system access. The weakness is captured by CWE‑394.

Affected Systems

The flaw affects Copeland XWEB Pro model 300D PRO, 500B PRO, and 500D PRO when running firmware 1.12.1 or earlier. These devices run Copeland hardware with the specified firmware, and users of any of the three mentioned models are vulnerable if they have not upgraded to a later firmware revision.

Risk and Exploitability

The CVSS score of 8.6 signifies a high‑severity vulnerability with potential for significant confidentiality and integrity compromise. EPSS indicates a very low exploitation likelihood (<1 %), and the flaw is not yet listed in the CISA KEV catalog. Nevertheless, because the attack vector is network‑based authentication, an attacker with network visibility could potentially gain full control of the device. Monitoring network activity and applying the vendor‑issued patch are critical.

Generated by OpenCVE AI on April 16, 2026 at 15:45 UTC.

Remediation

Vendor Solution

Copeland has provided a fix for the vulnerabilities and recommends users update the XWEB Pro to the latest version by going to their software update page https://webapps.copeland.com/Dixell/Pages/SystemSoftwareUpdate in the sections dedicated to the different XWEBPRO models page.


OpenCVE Recommended Actions

  • Apply the latest Copeland XWEB Pro firmware using the official software update page or by selecting SYSTEM → Updates → Network on the device when internet access is available.
  • If a firmware update cannot be performed immediately, restrict remote access to the device and limit authentication to trusted personnel until a patch is available.
  • Review authentication logs for suspicious or repeated failed attempts and adjust device hardening settings accordingly.

Generated by OpenCVE AI on April 16, 2026 at 15:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 09 Mar 2026 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Copeland xweb 300d Pro
Copeland xweb 300d Pro Firmware
Copeland xweb 500b Pro
Copeland xweb 500b Pro Firmware
Copeland xweb 500d Pro
Copeland xweb 500d Pro Firmware
CPEs cpe:2.3:h:copeland:xweb_300d_pro:-:*:*:*:*:*:*:*
cpe:2.3:h:copeland:xweb_500b_pro:-:*:*:*:*:*:*:*
cpe:2.3:h:copeland:xweb_500d_pro:-:*:*:*:*:*:*:*
cpe:2.3:o:copeland:xweb_300d_pro_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:copeland:xweb_500b_pro_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:copeland:xweb_500d_pro_firmware:*:*:*:*:*:*:*:*
Vendors & Products Copeland xweb 300d Pro
Copeland xweb 300d Pro Firmware
Copeland xweb 500b Pro
Copeland xweb 500b Pro Firmware
Copeland xweb 500d Pro
Copeland xweb 500d Pro Firmware

Mon, 02 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Copeland
Copeland copeland Xweb 300d Pro
Copeland copeland Xweb 500b Pro
Copeland copeland Xweb 500d Pro
Vendors & Products Copeland
Copeland copeland Xweb 300d Pro
Copeland copeland Xweb 500b Pro
Copeland copeland Xweb 500d Pro

Fri, 27 Feb 2026 01:00:00 +0000

Type Values Removed Values Added
Description A vulnerability exists in Copeland XWEB Pro version 1.12.1 and prior, in which an unexpected return value from the authentication routine is later on processed as a legitimate value, resulting in an authentication bypass.
Title Copeland XWEB and XWEB Pro Unexpected Status Code or Return Value
Weaknesses CWE-394
References
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L'}


Subscriptions

Copeland Copeland Xweb 300d Pro Copeland Xweb 500b Pro Copeland Xweb 500d Pro Xweb 300d Pro Xweb 300d Pro Firmware Xweb 500b Pro Xweb 500b Pro Firmware Xweb 500d Pro Xweb 500d Pro Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2026-03-02T18:58:50.355Z

Reserved: 2026-02-05T19:05:16.849Z

Link: CVE-2026-25085

cve-icon Vulnrichment

Updated: 2026-03-02T18:58:46.352Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-27T01:16:19.367

Modified: 2026-03-09T19:55:21.453

Link: CVE-2026-25085

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T15:45:16Z

Weaknesses