Описание
Cisco VPN 5000 series concentrator hardware 6.0.21.0002 and earlier, and 5.2.23.0003 and earlier, when using RADIUS with a challenge type of Password Authentication Protocol (PAP) or Challenge, sends the user password in cleartext in a validation retry request, which could allow remote attackers to steal passwords via sniffing.
Ссылки
- PatchVendor Advisory
- Broken Link
- Third Party AdvisoryVDB Entry
- PatchVendor Advisory
- Broken Link
- Third Party AdvisoryVDB Entry
Уязвимые конфигурации
Конфигурация 1Версия от 5.2.14 (включая) до 5.2.23.0003 (включая)Версия от 6.0.15 (включая) до 6.0.21.0002 (включая)
Одновременно
Одно из
cpe:2.3:o:cisco:vpn_5000_concentrator_series_software:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:vpn_5000_concentrator_series_software:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:vpn_5000_concentrator:-:*:*:*:*:*:*:*
EPSS
Процентиль: 73%
0.00764
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
Cisco VPN 5000 series concentrator hardware 6.0.21.0002 and earlier, and 5.2.23.0003 and earlier, when using RADIUS with a challenge type of Password Authentication Protocol (PAP) or Challenge, sends the user password in cleartext in a validation retry request, which could allow remote attackers to steal passwords via sniffing.
EPSS
Процентиль: 73%
0.00764
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other