Cisco VPN 5000 RADIUS PAP authentication vulnerability
The Cisco VPN 5000 series concentrator running firmware versions 6.0.21.0002 and 5.2.23.003 (and prior) sends the user's password in plain text to the RADIUS server in PAP authentication validation retry request packets. Attackers sniffing the network may be able to recover the user's password.
I was recently asked to create a simplistic blog on Cisco ISE that could be shared with high level technologists at the CIO/Director level. I started by outlining some of the basics of how Cisco ISE can give rich context information by answering the "Five...
Jonothan EavesTechnical Marketing Engineer, Cisco Systems, Inc.
About This Guide
This guide is intended to provide technical guidance to design, deploy and operate policy functions within Software Defined A...
Have you seen the following Cisco marketing campaign on Cisco.com, elsewhere on the web, or at trade shows, via vendors?
Do you know where that statistic comes from? It comes directly from our Cisco customers! Take a look for ...