Section 8.  Operation 
 
 
Note All security features can be subverted through physical access to the 
CR800. If absolute security is a requirement, the physical CR800 must be kept in 
a secure location. 
 
8.7.1  Vulnerabilities 
While "security through obscurity" may have provided sufficient protection in the 
past, Campbell Scientific dataloggers increasingly are deployed in sensitive 
applications.    Devising measures to counter malicious attacks, or innocent 
tinkering, requires an understanding of where systems can be compromised and 
how to counter the potential threat. 
Note Older CR800 operating systems are more vulnerable to attack than 
recent updates.    Updates can be obtained free of charge at 
www.campbellsci.com. 
The following bullet points outline vulnerabilities: 
•  CR1000KD Keyboard/Display 
o  Pressing and holding the Del key while powering up a CR800 will 
cause it to abort loading a program and provides a 120 second 
window to begin changing or disabling security codes in the settings 
editor (not Status table) with the keyboard display. 
o  Keyboard display security bypass does not allow comms access 
without first correcting the security code. 
o  Note These features are not operable in CR1000KDs with serial 
numbers less than 1263. Contact Campbell Scientific for information 
on upgrading the CR1000KD operating system. 
•  LoggerNet 
o  All datalogger functions and data are easily accessed via RS-232 
and Ethernet using Campbell Scientific datalogger support software. 
o  Cora command find-logger-security-code 
•  Telnet 
o  Watch IP traffic in detail.    IP traffic can reveal potentially sensitive 
information such as FTP login usernames and passwords, and server 
connection details including IP addresses and port numbers. 
o  Watch serial traffic with other dataloggers and devices.    A Modbus 
capable power meter is an example. 
o  View data in the Public and Status tables.