ID

VAR-200208-0056


CVE

CVE-2002-0848


TITLE

Cisco VPN 5000 Series concentrator RADIUS PAP Authentication vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200208-008

DESCRIPTION

Cisco VPN 5000 series concentrator hardware 6.0.21.0002 and earlier, and 5.2.23.0003 and earlier, when using RADIUS with a challenge type of Password Authentication Protocol (PAP) or Challenge, sends the user password in cleartext in a validation retry request, which could allow remote attackers to steal passwords via sniffing. The VPN 5000 Concentrator line supports the use of a RADIUS server to authenticate client connections. An error has been reported in this authentication process when either PAP or Challenge authentication is used. If more than one authentication message is transmitted, the client password will be sent in plaintext. Cisco has reported that this issue does not exist if CHAP authentication is used. The Cisco VPN 5000 Series Concentrators consist of a general-purpose remote-access virtual private network (VPN) platform and client software that combines high availability, performance, and scalability with today's most advanced encryption and authentication technologies for Professional operators or enterprise users provide services. User passwords may be sent in clear text. VPN 5000 series concentrators support three RADIUS communication methods. The keyword ChallengeType in the [RADIUS] section can be set to CHAP, PAP or Challenge. When using a RADIUS server, access requests are sent to the RADIUS server, and user passwords are encrypted according to RFC regulations. If within a certain period of time due to network or configuration problems, the server does not return an Access-Accept (allowing access) packet, then the concentrator will send a retry packet, but the user password in this packet is sent in plain text. All Cisco VPN 5000 Series Concentrator hardware using software versions 6.0.21.0002 (and earlier) and 5.2.23.0003 (and earlier) are affected by this vulnerability. This series includes the 5001, 5002 and 5008 models. Older versions of the IntraPort family of concentrator hardware are also affected by this vulnerability. This series includes IntraPort 2, IntraPort 2+, IntraPort Enterprise-2 and Enterprise-8, IntraPort Carrier-2 and Carrier-8 models. VPN 3000 series concentrator hardware is not affected by this vulnerability

Trust: 1.26

sources: NVD: CVE-2002-0848 // BID: 5417 // VULHUB: VHN-5239

AFFECTED PRODUCTS

vendor:ciscomodel:vpn 5000 concentrator series softwarescope:gteversion:6.0.15

Trust: 1.0

vendor:ciscomodel:vpn 5000 concentrator series softwarescope:lteversion:6.0.21.0002

Trust: 1.0

vendor:ciscomodel:vpn 5000 concentrator series softwarescope:lteversion:5.2.23.0003

Trust: 1.0

vendor:ciscomodel:vpn 5000 concentrator series softwarescope:gteversion:5.2.14

Trust: 1.0

vendor:ciscomodel:vpn 5000 concentrator series softwarescope:eqversion:5.2.23.0003

Trust: 0.6

vendor:ciscomodel:vpn 500 concentratorscope:eqversion:6.0.21.0002

Trust: 0.6

vendor:ciscomodel:vpn 500 concentratorscope:eqversion:5.2.23.0003

Trust: 0.6

vendor:ciscomodel:vpn concentratorscope:eqversion:5008

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:5002

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:5001

Trust: 0.3

vendor:ciscomodel:intraport enterprise-8scope: - version: -

Trust: 0.3

vendor:ciscomodel:intraport enterprise-2scope: - version: -

Trust: 0.3

vendor:ciscomodel:intraport carrier-8scope: - version: -

Trust: 0.3

vendor:ciscomodel:intraport carrier-2scope: - version: -

Trust: 0.3

vendor:ciscomodel:intraportscope:eqversion:2+

Trust: 0.3

vendor:ciscomodel:intraportscope:eqversion:2

Trust: 0.3

sources: BID: 5417 // CNNVD: CNNVD-200208-008 // NVD: CVE-2002-0848

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2002-0848
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-200208-008
value: MEDIUM

Trust: 0.6

VULHUB: VHN-5239
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2002-0848
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-5239
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-5239 // CNNVD: CNNVD-200208-008 // NVD: CVE-2002-0848

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2002-0848

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200208-008

TYPE

Design Error

Trust: 0.9

sources: BID: 5417 // CNNVD: CNNVD-200208-008

EXTERNAL IDS

db:BIDid:5417

Trust: 2.0

db:NVDid:CVE-2002-0848

Trust: 1.7

db:CNNVDid:CNNVD-200208-008

Trust: 0.7

db:XFid:5000

Trust: 0.6

db:CISCOid:20020807 CISCO VPN 5000 SERIES CONCENTRATOR RADIUS PAP AUTHENTICATION VULNERABILITY

Trust: 0.6

db:VULHUBid:VHN-5239

Trust: 0.1

sources: VULHUB: VHN-5239 // BID: 5417 // CNNVD: CNNVD-200208-008 // NVD: CVE-2002-0848

REFERENCES

url:http://www.securityfocus.com/bid/5417

Trust: 1.7

url:http://www.cisco.com/warp/public/707/vpn5k-radius-pap-vuln-pub.shtml

Trust: 1.7

url:http://www.iss.net/security_center/static/9781.php

Trust: 1.7

sources: VULHUB: VHN-5239 // CNNVD: CNNVD-200208-008 // NVD: CVE-2002-0848

CREDITS

Cisco PSIRT※ psirt@cisco.com

Trust: 0.6

sources: CNNVD: CNNVD-200208-008

SOURCES

db:VULHUBid:VHN-5239
db:BIDid:5417
db:CNNVDid:CNNVD-200208-008
db:NVDid:CVE-2002-0848

LAST UPDATE DATE

2024-08-14T14:09:09.104000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-5239date:2018-10-30T00:00:00
db:BIDid:5417date:2002-08-07T00:00:00
db:CNNVDid:CNNVD-200208-008date:2005-05-02T00:00:00
db:NVDid:CVE-2002-0848date:2018-10-30T16:25:33.607

SOURCES RELEASE DATE

db:VULHUBid:VHN-5239date:2002-08-12T00:00:00
db:BIDid:5417date:2002-08-07T00:00:00
db:CNNVDid:CNNVD-200208-008date:2002-08-12T00:00:00
db:NVDid:CVE-2002-0848date:2002-08-12T04:00:00