Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8cqc-9wjh-xjr2

Опубликовано: 30 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

Cisco VPN 5000 series concentrator hardware 6.0.21.0002 and earlier, and 5.2.23.0003 and earlier, when using RADIUS with a challenge type of Password Authentication Protocol (PAP) or Challenge, sends the user password in cleartext in a validation retry request, which could allow remote attackers to steal passwords via sniffing.

Cisco VPN 5000 series concentrator hardware 6.0.21.0002 and earlier, and 5.2.23.0003 and earlier, when using RADIUS with a challenge type of Password Authentication Protocol (PAP) or Challenge, sends the user password in cleartext in a validation retry request, which could allow remote attackers to steal passwords via sniffing.

EPSS

Процентиль: 73%
0.00764
Низкий

Связанные уязвимости

nvd
больше 23 лет назад

Cisco VPN 5000 series concentrator hardware 6.0.21.0002 and earlier, and 5.2.23.0003 and earlier, when using RADIUS with a challenge type of Password Authentication Protocol (PAP) or Challenge, sends the user password in cleartext in a validation retry request, which could allow remote attackers to steal passwords via sniffing.

EPSS

Процентиль: 73%
0.00764
Низкий