CVE-2023-0321 (GCVE-0-2023-0321)

Vulnerability from cvelistv5 – Published: 2023-01-25 00:00 – Updated: 2025-03-27 20:09
VLAI?
Title
Disclosure of Sensitive Information on Campbell Scientific Products
Summary
Campbell Scientific dataloggers CR6, CR300, CR800, CR1000 and CR3000 may allow an attacker to download configuration files, which may contain sensitive information about the internal network. From factory defaults, the mentioned datalogges have HTTP and PakBus enabled. The devices, with the default configuration, allow this situation via the PakBus port. The exploitation of this vulnerability may allow an attacker to download, modify, and upload new configuration files.
CWE
  • CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Assigner
Credits
Carlos Antonini Cepeda
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T05:10:55.177Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.incibe-cert.es/en/early-warning/ics-advisories/disclosure-sensitive-information-campbell-scientific-products"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.hackplayers.com/2023/01/cve-2023-0321-info-sensible-campbell.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-0321",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-03-27T20:06:58.630452Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-27T20:09:03.149Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "CR6",
          "vendor": "Campbell Scientific",
          "versions": [
            {
              "status": "affected",
              "version": "all version"
            }
          ]
        },
        {
          "product": "CR300",
          "vendor": "Campbell Scientific",
          "versions": [
            {
              "status": "affected",
              "version": "all version"
            }
          ]
        },
        {
          "product": "CR800",
          "vendor": "Campbell Scientific",
          "versions": [
            {
              "status": "affected",
              "version": "all version"
            }
          ]
        },
        {
          "product": "CR1000",
          "vendor": "Campbell Scientific",
          "versions": [
            {
              "status": "affected",
              "version": "all version"
            }
          ]
        },
        {
          "product": "CR3000",
          "vendor": "Campbell Scientific",
          "versions": [
            {
              "status": "affected",
              "version": "all version"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Carlos Antonini Cepeda"
        }
      ],
      "datePublic": "2023-01-17T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Campbell Scientific dataloggers CR6, CR300, CR800, CR1000 and CR3000 may allow an attacker to download configuration files, which may contain sensitive information about the internal network. From factory defaults, the mentioned datalogges have HTTP and PakBus enabled. The devices, with the default configuration, allow this situation via the PakBus port. The exploitation of this vulnerability may allow an attacker to download, modify, and upload new configuration files."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-200",
              "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-01-25T00:00:00.000Z",
        "orgId": "0cbda920-cd7f-484a-8e76-bf7f4b7f4516",
        "shortName": "INCIBE"
      },
      "references": [
        {
          "url": "https://www.incibe-cert.es/en/early-warning/ics-advisories/disclosure-sensitive-information-campbell-scientific-products"
        },
        {
          "url": "https://www.hackplayers.com/2023/01/cve-2023-0321-info-sensible-campbell.html"
        }
      ],
      "source": {
        "advisory": "INCIBE-2023-0017",
        "defect": [
          "INCIBE-2022-0040"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "Disclosure of Sensitive Information on Campbell Scientific Products",
      "workarounds": [
        {
          "lang": "en",
          "value": "HTTP can be disabled or secured through username/password, and Pakbus can be secured through the use of PakBus encryption key and/or PakBus/TCP password. Campbell Scientific offers a guide with instructions to maximize the security of all Internet connectivity of the affected devices (see more in the references)."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "0cbda920-cd7f-484a-8e76-bf7f4b7f4516",
    "assignerShortName": "INCIBE",
    "cveId": "CVE-2023-0321",
    "datePublished": "2023-01-25T00:00:00.000Z",
    "dateReserved": "2023-01-16T00:00:00.000Z",
    "dateUpdated": "2025-03-27T20:09:03.149Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:campbellsci:cr6_firmware:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"839FB9B3-A45D-48B9-B5D1-9993CE72836C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:campbellsci:cr6:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"180EDEFC-E463-43FF-AF07-66523FE02287\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:campbellsci:cr300_firmware:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"110C6716-4EE2-4D25-B191-9F9FD5BF01F5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:campbellsci:cr300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"587D4B62-2909-439C-81AF-36817DC1D12F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:campbellsci:cr800_firmware:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A05CFD2E-51B7-4980-82B9-7B1F9E16591B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:campbellsci:cr800:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"69E48618-8055-47A7-A002-AF2F2E6EDD97\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:campbellsci:cr1000_firmware:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4802F9ED-80EB-454A-AC89-F30709D83C2A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:campbellsci:cr1000:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"13E535FC-E2B5-4B0E-AD5A-FB8EBE8658DC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:campbellsci:cr3000_firmware:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE27FEEF-4AAD-4B4C-B533-BD6D93740E18\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:campbellsci:cr3000:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9B86603C-C6A7-4E66-A2C8-B2F168A23AD9\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Campbell Scientific dataloggers CR6, CR300, CR800, CR1000 and CR3000 may allow an attacker to download configuration files, which may contain sensitive information about the internal network. From factory defaults, the mentioned datalogges have HTTP and PakBus enabled. The devices, with the default configuration, allow this situation via the PakBus port. The exploitation of this vulnerability may allow an attacker to download, modify, and upload new configuration files.\"}, {\"lang\": \"es\", \"value\": \"Los registradores de datos Campbell Scientific CR6, CR300, CR800, CR1000 y CR3000 pueden permitir a un atacante descargar archivos de configuraci\\u00f3n, que pueden contener informaci\\u00f3n confidencial sobre la red interna. Por defecto de f\\u00e1brica, los registros de datos mencionados tienen HTTP y PakBus habilitados. Los dispositivos, con la configuraci\\u00f3n predeterminada, permiten esta situaci\\u00f3n a trav\\u00e9s del puerto PakBus. La explotaci\\u00f3n de esta vulnerabilidad puede permitir a un atacante descargar, modificar y cargar nuevos archivos de configuraci\\u00f3n.\"}]",
      "id": "CVE-2023-0321",
      "lastModified": "2024-11-21T07:36:58.030",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"cve-coordination@incibe.es\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N\", \"baseScore\": 9.1, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.2}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N\", \"baseScore\": 9.1, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.2}]}",
      "published": "2023-01-26T21:18:07.143",
      "references": "[{\"url\": \"https://www.hackplayers.com/2023/01/cve-2023-0321-info-sensible-campbell.html\", \"source\": \"cve-coordination@incibe.es\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://www.incibe-cert.es/en/early-warning/ics-advisories/disclosure-sensitive-information-campbell-scientific-products\", \"source\": \"cve-coordination@incibe.es\", \"tags\": [\"Mitigation\", \"Third Party Advisory\"]}, {\"url\": \"https://www.hackplayers.com/2023/01/cve-2023-0321-info-sensible-campbell.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://www.incibe-cert.es/en/early-warning/ics-advisories/disclosure-sensitive-information-campbell-scientific-products\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mitigation\", \"Third Party Advisory\"]}]",
      "sourceIdentifier": "cve-coordination@incibe.es",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"cve-coordination@incibe.es\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-200\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-200\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-0321\",\"sourceIdentifier\":\"cve-coordination@incibe.es\",\"published\":\"2023-01-26T21:18:07.143\",\"lastModified\":\"2024-11-21T07:36:58.030\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Campbell Scientific dataloggers CR6, CR300, CR800, CR1000 and CR3000 may allow an attacker to download configuration files, which may contain sensitive information about the internal network. From factory defaults, the mentioned datalogges have HTTP and PakBus enabled. The devices, with the default configuration, allow this situation via the PakBus port. The exploitation of this vulnerability may allow an attacker to download, modify, and upload new configuration files.\"},{\"lang\":\"es\",\"value\":\"Los registradores de datos Campbell Scientific CR6, CR300, CR800, CR1000 y CR3000 pueden permitir a un atacante descargar archivos de configuraci\u00f3n, que pueden contener informaci\u00f3n confidencial sobre la red interna. Por defecto de f\u00e1brica, los registros de datos mencionados tienen HTTP y PakBus habilitados. Los dispositivos, con la configuraci\u00f3n predeterminada, permiten esta situaci\u00f3n a trav\u00e9s del puerto PakBus. La explotaci\u00f3n de esta vulnerabilidad puede permitir a un atacante descargar, modificar y cargar nuevos archivos de configuraci\u00f3n.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cve-coordination@incibe.es\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N\",\"baseScore\":9.1,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":5.2},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N\",\"baseScore\":9.1,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"cve-coordination@incibe.es\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:campbellsci:cr6_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"839FB9B3-A45D-48B9-B5D1-9993CE72836C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:campbellsci:cr6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"180EDEFC-E463-43FF-AF07-66523FE02287\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:campbellsci:cr300_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"110C6716-4EE2-4D25-B191-9F9FD5BF01F5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:campbellsci:cr300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"587D4B62-2909-439C-81AF-36817DC1D12F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:campbellsci:cr800_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A05CFD2E-51B7-4980-82B9-7B1F9E16591B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:campbellsci:cr800:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69E48618-8055-47A7-A002-AF2F2E6EDD97\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:campbellsci:cr1000_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4802F9ED-80EB-454A-AC89-F30709D83C2A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:campbellsci:cr1000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13E535FC-E2B5-4B0E-AD5A-FB8EBE8658DC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:campbellsci:cr3000_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE27FEEF-4AAD-4B4C-B533-BD6D93740E18\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:campbellsci:cr3000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B86603C-C6A7-4E66-A2C8-B2F168A23AD9\"}]}]}],\"references\":[{\"url\":\"https://www.hackplayers.com/2023/01/cve-2023-0321-info-sensible-campbell.html\",\"source\":\"cve-coordination@incibe.es\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://www.incibe-cert.es/en/early-warning/ics-advisories/disclosure-sensitive-information-campbell-scientific-products\",\"source\":\"cve-coordination@incibe.es\",\"tags\":[\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"https://www.hackplayers.com/2023/01/cve-2023-0321-info-sensible-campbell.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://www.incibe-cert.es/en/early-warning/ics-advisories/disclosure-sensitive-information-campbell-scientific-products\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Third Party Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.incibe-cert.es/en/early-warning/ics-advisories/disclosure-sensitive-information-campbell-scientific-products\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.hackplayers.com/2023/01/cve-2023-0321-info-sensible-campbell.html\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T05:10:55.177Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-0321\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-03-27T20:06:58.630452Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-03-27T20:08:40.349Z\"}}], \"cna\": {\"title\": \"Disclosure of Sensitive Information on Campbell Scientific Products\", \"source\": {\"defect\": [\"INCIBE-2022-0040\"], \"advisory\": \"INCIBE-2023-0017\", \"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"value\": \"Carlos Antonini Cepeda\"}], \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 9.1, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"Campbell Scientific\", \"product\": \"CR6\", \"versions\": [{\"status\": \"affected\", \"version\": \"all version\"}]}, {\"vendor\": \"Campbell Scientific\", \"product\": \"CR300\", \"versions\": [{\"status\": \"affected\", \"version\": \"all version\"}]}, {\"vendor\": \"Campbell Scientific\", \"product\": \"CR800\", \"versions\": [{\"status\": \"affected\", \"version\": \"all version\"}]}, {\"vendor\": \"Campbell Scientific\", \"product\": \"CR1000\", \"versions\": [{\"status\": \"affected\", \"version\": \"all version\"}]}, {\"vendor\": \"Campbell Scientific\", \"product\": \"CR3000\", \"versions\": [{\"status\": \"affected\", \"version\": \"all version\"}]}], \"datePublic\": \"2023-01-17T00:00:00.000Z\", \"references\": [{\"url\": \"https://www.incibe-cert.es/en/early-warning/ics-advisories/disclosure-sensitive-information-campbell-scientific-products\"}, {\"url\": \"https://www.hackplayers.com/2023/01/cve-2023-0321-info-sensible-campbell.html\"}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"HTTP can be disabled or secured through username/password, and Pakbus can be secured through the use of PakBus encryption key and/or PakBus/TCP password. Campbell Scientific offers a guide with instructions to maximize the security of all Internet connectivity of the affected devices (see more in the references).\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.0.9\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Campbell Scientific dataloggers CR6, CR300, CR800, CR1000 and CR3000 may allow an attacker to download configuration files, which may contain sensitive information about the internal network. From factory defaults, the mentioned datalogges have HTTP and PakBus enabled. The devices, with the default configuration, allow this situation via the PakBus port. The exploitation of this vulnerability may allow an attacker to download, modify, and upload new configuration files.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-200\", \"description\": \"CWE-200: Exposure of Sensitive Information to an Unauthorized Actor\"}]}], \"providerMetadata\": {\"orgId\": \"0cbda920-cd7f-484a-8e76-bf7f4b7f4516\", \"shortName\": \"INCIBE\", \"dateUpdated\": \"2023-01-25T00:00:00.000Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2023-0321\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-03-27T20:09:03.149Z\", \"dateReserved\": \"2023-01-16T00:00:00.000Z\", \"assignerOrgId\": \"0cbda920-cd7f-484a-8e76-bf7f4b7f4516\", \"datePublished\": \"2023-01-25T00:00:00.000Z\", \"assignerShortName\": \"INCIBE\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…