Campbell Scientific dataloggers CR6, CR300, CR800, CR1000 and CR3000 may allow an attacker to download configuration files, which may contain sensitive information about the internal network. From factory defaults, the mentioned datalogges have HTTP and PakBus enabled. The devices, with the default configuration, allow this situation via the PakBus port. The exploitation of this vulnerability may allow an attacker to download, modify, and upload new configuration files.
References
Link | Resource |
---|---|
https://www.incibe-cert.es/en/early-warning/ics-advisories/disclosure-sensitive-information-campbell-scientific-products | Mitigation Third Party Advisory |
https://www.hackplayers.com/2023/01/cve-2023-0321-info-sensible-campbell.html | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Information
Published : 2023-01-26 13:18
Updated : 2023-02-06 08:42
NVD link : CVE-2023-0321
Mitre link : CVE-2023-0321
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
campbellsci
- cr800
- cr300_firmware
- cr6
- cr3000
- cr300
- cr800_firmware
- cr1000_firmware
- cr6_firmware
- cr1000
- cr3000_firmware