An OS command injection
vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an
authenticated attacker to achieve remote code execution on the system by
injecting malicious input into OpenSSL argument fields within requests
sent to the utility route, leading to remote code execution.
Copeland has provided a fix for the vulnerabilities and recommends users
update the XWEB Pro to the latest version by going to their software
update page
https://webapps.copeland.com/Dixell/Pages/SystemSoftwareUpdate in the
sections dedicated to the different XWEBPRO models page.
Alternatively, a user logged into an XWEB Pro with internet access can
update XWEB Pro directly from Copeland servers via the menu SYSTEM --
Updates | Network.
Configurations
Workarounds
Exploits
Credits
finder
Amir Zaltzman and Noam Moshe of Claroty Team82 reported this vulnerability to CISA.