CVE-2002-0848
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
12/08/2002
Last modified:
03/04/2025
Description
Cisco VPN 5000 series concentrator hardware 6.0.21.0002 and earlier, and 5.2.23.0003 and earlier, when using RADIUS with a challenge type of Password Authentication Protocol (PAP) or Challenge, sends the user password in cleartext in a validation retry request, which could allow remote attackers to steal passwords via sniffing.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:cisco:vpn_5000_concentrator_series_software:*:*:*:*:*:*:*:* | 5.2.14 (including) | 5.2.23.0003 (including) |
cpe:2.3:o:cisco:vpn_5000_concentrator_series_software:*:*:*:*:*:*:*:* | 6.0.15 (including) | 6.0.21.0002 (including) |
cpe:2.3:h:cisco:vpn_5000_concentrator:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.cisco.com/warp/public/707/vpn5k-radius-pap-vuln-pub.shtml
- http://www.iss.net/security_center/static/9781.php
- http://www.securityfocus.com/bid/5417
- http://www.cisco.com/warp/public/707/vpn5k-radius-pap-vuln-pub.shtml
- http://www.iss.net/security_center/static/9781.php
- http://www.securityfocus.com/bid/5417