CVE-2023-0321
Published Jan 26, 2023
Last updated 2 years ago
Overview
- Description
- Campbell Scientific dataloggers CR6, CR300, CR800, CR1000 and CR3000 may allow an attacker to download configuration files, which may contain sensitive information about the internal network. From factory defaults, the mentioned datalogges have HTTP and PakBus enabled. The devices, with the default configuration, allow this situation via the PakBus port. The exploitation of this vulnerability may allow an attacker to download, modify, and upload new configuration files.
- Source
- cve-coordination@incibe.es
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 9.1
- Impact score
- 5.2
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
- Severity
- CRITICAL
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:campbellsci:cr6:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "180EDEFC-E463-43FF-AF07-66523FE02287" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:campbellsci:cr6_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "839FB9B3-A45D-48B9-B5D1-9993CE72836C" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:campbellsci:cr300:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "587D4B62-2909-439C-81AF-36817DC1D12F" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:campbellsci:cr300_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "110C6716-4EE2-4D25-B191-9F9FD5BF01F5" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:campbellsci:cr800:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "69E48618-8055-47A7-A002-AF2F2E6EDD97" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:campbellsci:cr800_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A05CFD2E-51B7-4980-82B9-7B1F9E16591B" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:campbellsci:cr1000:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "13E535FC-E2B5-4B0E-AD5A-FB8EBE8658DC" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:campbellsci:cr1000_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4802F9ED-80EB-454A-AC89-F30709D83C2A" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:campbellsci:cr3000:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9B86603C-C6A7-4E66-A2C8-B2F168A23AD9" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:campbellsci:cr3000_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CE27FEEF-4AAD-4B4C-B533-BD6D93740E18" } ], "operator": "OR" } ], "operator": "AND" } ]