Cisco VPN 5000 RADIUS PAP authentication vulnerability
The Cisco VPN 5000 series concentrator running firmware versions 6.0.21.0002 and 5.2.23.003 (and prior) sends the user's password in plain text to the RADIUS server in PAP authentication validation retry request packets. Attackers sniffing the network may be able to recover the user's password.
Jonothan EavesTechnical Marketing Engineer, Cisco Systems, Inc.
#CiscoChat: Driving a New Data Culture: How companies must adapt in the age of machine learning
About This Guide
This guide is intended to prov...
Have you seen the following Cisco marketing campaign on Cisco.com, elsewhere on the web, or at trade shows, via vendors?
Do you know where that statistic comes from? It comes directly from our Cisco customers! Take a look for ...
I just wanted to share a configuration I have been working on. There are two internet circuits to two different Internet service providers (ISPs). Say we want to do BGP between the two ISPs and place a firewall between our boundary routers and...