Campbell Scientific dataloggers CR6, CR300, CR800, CR1000 and CR3000 may allow an attacker to download configuration files, which may contain sensitive information about the internal network. From factory defaults, the mentioned datalogges have HTTP and PakBus enabled. The devices, with the default configuration, allow this situation via the PakBus port. The exploitation of this vulnerability may allow an attacker to download, modify, and upload new configuration files.
References
Link | Resource |
---|---|
https://www.hackplayers.com/2023/01/cve-2023-0321-info-sensible-campbell.html | Exploit Third Party Advisory |
https://www.incibe-cert.es/en/early-warning/ics-advisories/disclosure-sensitive-information-campbell-scientific-products | Mitigation Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: INCIBE
Published: 2023-01-25T00:00:00
Updated: 2023-01-25T00:00:00
Reserved: 2023-01-16T00:00:00
Link: CVE-2023-0321
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-01-26T21:18:07.143
Modified: 2023-02-06T16:42:45.710
Link: CVE-2023-0321
JSON object: View
Redhat Information
No data.
CWE