The Campbell Scientific CSI Web Server stores web authentication credentials in a file with a specific file name. Passwords within that file are stored in a weakly encoded format. There is no known way to remotely access the file unless it has been manually renamed. However, if an attacker were to gain access to the file, passwords could be decoded and reused to gain access.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-46656 The Campbell Scientific CSI Web Server stores web authentication credentials in a file with a specific file name. Passwords within that file are stored in a weakly encoded format. There is no known way to remotely access the file unless it has been manually renamed. However, if an attacker were to gain access to the file, passwords could be decoded and reused to gain access.
Fixes

Solution

Campbell Scientific recommends users to update to the version. For user of CSI Web Server update to the most recent CSI Web Server 1.x patch https://www.campbellsci.com/downloads/csi-web-server-patch For users of RTMC Pro 5 update to the most recent RTMC Pro 5.x patch https://www.campbellsci.com/downloads/rtmc-pro-5-patch For users of RTMC Pro 4 update to the most recent RTMC Pro 4.x patch https://www.campbellsci.com/downloads/rtmc-pro-patch . Contact Campbell Scientific https://www.campbellsci.com/contact  for more details.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-08-01T21:11:12.752Z

Reserved: 2024-05-28T13:59:14.696Z

Link: CVE-2024-5434

cve-icon Vulnrichment

Updated: 2024-05-28T20:08:28.963Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-28T19:15:11.623

Modified: 2024-11-21T09:47:40.653

Link: CVE-2024-5434

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.