CVE-2002-0848

Cisco VPN 5000 series concentrator hardware 6.0.21.0002 and earlier, and 5.2.23.0003 and earlier, when using RADIUS with a challenge type of Password Authentication Protocol (PAP) or Challenge, sends the user password in cleartext in a validation retry request, which could allow remote attackers to steal passwords via sniffing.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:cisco:vpn_5000_concentrator_series_software:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:vpn_5000_concentrator_series_software:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:vpn_5000_concentrator:-:*:*:*:*:*:*:*

History

20 Nov 2024, 23:40

Type Values Removed Values Added
References () http://www.cisco.com/warp/public/707/vpn5k-radius-pap-vuln-pub.shtml - Patch, Vendor Advisory () http://www.cisco.com/warp/public/707/vpn5k-radius-pap-vuln-pub.shtml - Patch, Vendor Advisory
References () http://www.iss.net/security_center/static/9781.php - Broken Link () http://www.iss.net/security_center/static/9781.php - Broken Link
References () http://www.securityfocus.com/bid/5417 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/5417 - Third Party Advisory, VDB Entry

Information

Published : 2002-08-12 04:00

Updated : 2024-11-20 23:40


NVD link : CVE-2002-0848

Mitre link : CVE-2002-0848

CVE.ORG link : CVE-2002-0848


JSON object : View

Products Affected

cisco

  • vpn_5000_concentrator
  • vpn_5000_concentrator_series_software