CVE-2002-0848
Cisco VPN 5000 series concentrator hardware 6.0.21.0002 and earlier, and 5.2.23.0003 and earlier, when using RADIUS with a challenge type of Password Authentication Protocol (PAP) or Challenge, sends the user password in cleartext in a validation retry request, which could allow remote attackers to steal passwords via sniffing.
Date published : 2003-04-02
http://www.securityfocus.com/bid/5417
http://www.cisco.com/warp/public/707/vpn5k-radius-pap-vuln-pub.shtml
