CVE-2002-0848

N/A Unknown
Published: August 12, 2002 Modified: April 16, 2026
View on NVD

Description

Cisco VPN 5000 series concentrator hardware 6.0.21.0002 and earlier, and 5.2.23.0003 and earlier, when using RADIUS with a challenge type of Password Authentication Protocol (PAP) or Challenge, sends the user password in cleartext in a validation retry request, which could allow remote attackers to steal passwords via sniffing.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://www.securityfocus.com/bid/5417
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://www.cisco.com/warp/public/707/vpn5k-radius-pap-vuln-pub.shtml
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.iss.net/security_center/static/9781.php
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.securityfocus.com/bid/5417
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry

6 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.9%
76th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

cisco