mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
239 lines
7.1 KiB
JSON
239 lines
7.1 KiB
JSON
{
|
|
"id": "CVE-2023-0321",
|
|
"sourceIdentifier": "cve-coordination@incibe.es",
|
|
"published": "2023-01-26T21:18:07.143",
|
|
"lastModified": "2023-02-06T16:42:45.710",
|
|
"vulnStatus": "Analyzed",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Campbell Scientific dataloggers CR6, CR300, CR800, CR1000 and CR3000 may allow an attacker to download configuration files, which may contain sensitive information about the internal network. From factory defaults, the mentioned datalogges have HTTP and PakBus enabled. The devices, with the default configuration, allow this situation via the PakBus port. The exploitation of this vulnerability may allow an attacker to download, modify, and upload new configuration files."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Los registradores de datos Campbell Scientific CR6, CR300, CR800, CR1000 y CR3000 pueden permitir a un atacante descargar archivos de configuraci\u00f3n, que pueden contener informaci\u00f3n confidencial sobre la red interna. Por defecto de f\u00e1brica, los registros de datos mencionados tienen HTTP y PakBus habilitados. Los dispositivos, con la configuraci\u00f3n predeterminada, permiten esta situaci\u00f3n a trav\u00e9s del puerto PakBus. La explotaci\u00f3n de esta vulnerabilidad puede permitir a un atacante descargar, modificar y cargar nuevos archivos de configuraci\u00f3n."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 9.1,
|
|
"baseSeverity": "CRITICAL"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 5.2
|
|
},
|
|
{
|
|
"source": "cve-coordination@incibe.es",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 9.1,
|
|
"baseSeverity": "CRITICAL"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 5.2
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-200"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"source": "cve-coordination@incibe.es",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-200"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:campbellsci:cr6:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "180EDEFC-E463-43FF-AF07-66523FE02287"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:campbellsci:cr6_firmware:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "839FB9B3-A45D-48B9-B5D1-9993CE72836C"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:campbellsci:cr300:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "587D4B62-2909-439C-81AF-36817DC1D12F"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:campbellsci:cr300_firmware:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "110C6716-4EE2-4D25-B191-9F9FD5BF01F5"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:campbellsci:cr800:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "69E48618-8055-47A7-A002-AF2F2E6EDD97"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:campbellsci:cr800_firmware:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A05CFD2E-51B7-4980-82B9-7B1F9E16591B"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:campbellsci:cr1000:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "13E535FC-E2B5-4B0E-AD5A-FB8EBE8658DC"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:campbellsci:cr1000_firmware:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4802F9ED-80EB-454A-AC89-F30709D83C2A"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:campbellsci:cr3000:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9B86603C-C6A7-4E66-A2C8-B2F168A23AD9"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:campbellsci:cr3000_firmware:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CE27FEEF-4AAD-4B4C-B533-BD6D93740E18"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://www.hackplayers.com/2023/01/cve-2023-0321-info-sensible-campbell.html",
|
|
"source": "cve-coordination@incibe.es",
|
|
"tags": [
|
|
"Exploit",
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://www.incibe-cert.es/en/early-warning/ics-advisories/disclosure-sensitive-information-campbell-scientific-products",
|
|
"source": "cve-coordination@incibe.es",
|
|
"tags": [
|
|
"Mitigation",
|
|
"Third Party Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |