{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2023-0321","assignerOrgId":"0cbda920-cd7f-484a-8e76-bf7f4b7f4516","assignerShortName":"INCIBE","dateUpdated":"2025-03-27T20:09:03.149Z","dateReserved":"2023-01-16T00:00:00.000Z","datePublished":"2023-01-25T00:00:00.000Z"},"containers":{"cna":{"title":"Disclosure of Sensitive Information on Campbell Scientific Products","datePublic":"2023-01-17T00:00:00.000Z","providerMetadata":{"orgId":"0cbda920-cd7f-484a-8e76-bf7f4b7f4516","shortName":"INCIBE","dateUpdated":"2023-01-25T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"Campbell Scientific dataloggers CR6, CR300, CR800, CR1000 and CR3000 may allow an attacker to download configuration files, which may contain sensitive information about the internal network. From factory defaults, the mentioned datalogges have HTTP and PakBus enabled. The devices, with the default configuration, allow this situation via the PakBus port. The exploitation of this vulnerability may allow an attacker to download, modify, and upload new configuration files."}],"affected":[{"vendor":"Campbell Scientific","product":"CR6","versions":[{"version":"all version","status":"affected"}]},{"vendor":"Campbell Scientific","product":"CR300","versions":[{"version":"all version","status":"affected"}]},{"vendor":"Campbell Scientific","product":"CR800","versions":[{"version":"all version","status":"affected"}]},{"vendor":"Campbell Scientific","product":"CR1000","versions":[{"version":"all version","status":"affected"}]},{"vendor":"Campbell Scientific","product":"CR3000","versions":[{"version":"all version","status":"affected"}]}],"references":[{"url":"https://www.incibe-cert.es/en/early-warning/ics-advisories/disclosure-sensitive-information-campbell-scientific-products"},{"url":"https://www.hackplayers.com/2023/01/cve-2023-0321-info-sensible-campbell.html"}],"credits":[{"lang":"en","value":"Carlos Antonini Cepeda"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":9.1,"baseSeverity":"CRITICAL"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-200: Exposure of Sensitive Information to an Unauthorized Actor","cweId":"CWE-200"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"advisory":"INCIBE-2023-0017","defect":["INCIBE-2022-0040"],"discovery":"EXTERNAL"},"workarounds":[{"lang":"en","value":"HTTP can be disabled or secured through username/password, and Pakbus can be secured through the use of PakBus encryption key and/or PakBus/TCP password. Campbell Scientific offers a guide with instructions to maximize the security of all Internet connectivity of the affected devices (see more in the references)."}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T05:10:55.177Z"},"title":"CVE Program Container","references":[{"url":"https://www.incibe-cert.es/en/early-warning/ics-advisories/disclosure-sensitive-information-campbell-scientific-products","tags":["x_transferred"]},{"url":"https://www.hackplayers.com/2023/01/cve-2023-0321-info-sensible-campbell.html","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-03-27T20:06:58.630452Z","id":"CVE-2023-0321","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-27T20:09:03.149Z"}}]}}