The software is not free but is often installed on university and business computers in accordance with a site-license. As with most corporate licenses, administrators are allowed to freely distribute the software to users within their network.
The open-source vpnc client can connect to most VPNs supported by the official client.
VPN Client 4.9.01.0230 beta added support for Mac OS X 10.6.3 Stable version 4.9.01.0180 appears to lack that support; 4.9.00.0050 explicitly did not support versions of Mac OS X later than 10.5.4
VPN Client 5.0.07.0290 added support for 64-bit versions of Windows Vista and Windows 7.5
The client uses profile configuration files (.pcf) that store VPN passwords either hashed with type 7, or stored as plaintext. A vulnerability has been identified,6 and those passwords can easily be decoded using software or online services.7 To work around these issues, network administrators are advised to use the Mutual Group Authentication feature, or use unique passwords (that aren't related to other important network passwords).8
"Cisco Secure Products and Solutions". https://www.cisco.com/c/en/us/products/collateral/security/vpn-client/end_of_life_c51-680819.html ↩
"Cisco-VPN-client". https://www.cisco.com/c/en/us/support/web/obsolete/security-vpn-client.html ↩
Release Notes for VPN Client, Release 4.9.01.0230 Beta for Mac OS X https://www.cisco.com/web/software/282364316/35919/4.9.1.0230-beta-rel-notes.txt ↩
Release Notes for VPN Client, Release 4.9.00.0050 for Mac OS X, Revised: May 21, 2010, OL-11179-04 https://www.cisco.com/en/US/docs/security/vpn_client/cisco_vpn_client/vpn_client49/release/notes/49client.pdf ↩
Release Notes for Cisco VPN Client, Release 5.0.07.0290 https://www.cisco.com/en/US/docs/security/vpn_client/cisco_vpn_client/vpn_client5007/release/notes/vpnclient5007.html#wp84047 ↩
"Cisco Security Notice: Cisco IPsec VPN Implementation Group Password Usage Vulnerability". https://www.cisco.com/en/US/tech/tk583/tk372/technologies_security_notice09186a0080215981.html ↩
"Cisco Systems VPN Client Group Password Decoder". http://www.unix-ag.uni-kl.de/~massar/bin/cisco-decode ↩