5
CVSSv2

CVE-2002-0848

Published: 12/08/2002 Updated: 30/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Cisco VPN 5000 series concentrator hardware 6.0.21.0002 and previous versions, and 5.2.23.0003 and previous versions, when using RADIUS with a challenge type of Password Authentication Protocol (PAP) or Challenge, sends the user password in cleartext in a validation retry request, which could allow remote malicious users to steal passwords via sniffing.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco vpn_5000_concentrator_series_software

Vendor Advisories

When a VPN 5000 series concentrator is configured to use a Remote Authentication Dial In User Service (RADIUS) server to authenticate client connections and the challenge type chosen is Password Authentication Protocol (PAP) or Challenge (a hybrid of PAP), the validation retry request sent to the RADIUS server when validation fails the firs ...