CVE-2026-22877
Published: 27 February 2026
Summary
CVE-2026-22877 is a low-severity Path Traversal (CWE-22) vulnerability in Copeland Xweb 300D Pro Firmware. Its CVSS base score is 3.7 (Low).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 11.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the CVE by requiring timely remediation of the arbitrary file-read flaw through vendor-provided software updates for XWEB Pro.
Prevents exploitation of the path traversal vulnerability (CWE-22) by validating and sanitizing file path inputs to block unauthorized file access.
Enforces logical access controls to restrict unauthenticated remote reading of arbitrary system files despite the vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated remote arbitrary file read in public-facing XWEB Pro web application directly enables T1190 (Exploit Public-Facing Application). Facilitates T1005 (Data from Local System) by allowing remote access to arbitrary files for collection.
NVD Description
An arbitrary file-read vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling unauthenticated attackers to read arbitrary files on the system, and potentially causing a denial-of-service attack.
Deeper analysisAI
CVE-2026-22877 is an arbitrary file-read vulnerability (CWE-22) affecting XWEB Pro version 1.12.1 and prior. Published on 2026-02-27, it has a CVSS v3.1 base score of 3.7 (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N), indicating low severity with network accessibility but high attack complexity required.
Unauthenticated attackers can exploit this vulnerability remotely to read arbitrary files on the affected system. While the primary impact is limited confidentiality (low), the vulnerability may also enable denial-of-service conditions.
CISA's ICS Advisory ICSA-26-057-10 provides details on the issue, available at https://www.cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-057-10.json and https://www.cisa.gov/news-events/ics-advisories/icsa-26-057-10. Vendor guidance on system software updates is at https://webapps.copeland.com/Dixell/Pages/SystemSoftwareUpdate.
Details
- CWE(s)