CVE-2024-40750: n/a
CVE-2024-40750 is a medium-severity vulnerability affecting Linksys Velop Pro 6E devices (models MX6200_1. 0. 8. 215731 and 7 1. 0. 10. 215314). During app-based installation, these devices transmit Wi-Fi passwords in cleartext over the public Internet, exposing sensitive credentials to interception. This vulnerability stems from improper handling of sensitive data (CWE-312). Exploitation requires local access with low privileges and no user interaction, but the attack vector is local network-based.
AI Analysis
Technical Summary
CVE-2024-40750 identifies a vulnerability in Linksys Velop Pro 6E mesh Wi-Fi systems, specifically versions MX6200_1.0.8.215731 and 7 1.0.10.215314. The flaw involves the transmission of Wi-Fi passwords in cleartext over the public Internet during the app-based installation process. This means that when users set up their devices using the official app, the Wi-Fi credentials are sent without encryption, exposing them to interception by attackers monitoring the network traffic. The vulnerability is classified under CWE-312, which relates to the cleartext storage or transmission of sensitive information. The CVSS 3.1 base score is 5.3 (medium), reflecting that the attack vector is local (AV:L), requires low privileges (PR:L), and no user interaction (UI:N) is needed. The impact affects confidentiality, integrity, and availability to a limited degree (C:L/I:L/A:L). No patches or fixes have been released at the time of publication, and there are no known exploits in the wild. This vulnerability could allow attackers on the same local network or with access to the communication path to capture Wi-Fi passwords, potentially enabling unauthorized network access and further attacks.
Potential Impact
The primary impact of this vulnerability is the exposure of Wi-Fi passwords during device setup, which compromises the confidentiality of network credentials. Attackers who intercept these cleartext transmissions can gain unauthorized access to the victim’s Wi-Fi network, potentially leading to further network intrusion, data theft, or lateral movement within the network. Although the vulnerability requires local network access or the ability to monitor traffic between the device and the app, the risk is significant in environments where network traffic is not adequately segmented or encrypted. The integrity and availability impacts are limited but present, as attackers with network access could disrupt or manipulate network traffic. Organizations relying on Linksys Velop Pro 6E devices may face increased risk of unauthorized access, especially in enterprise or sensitive environments where Wi-Fi security is critical. The lack of patches increases exposure duration, emphasizing the need for interim mitigations.
Mitigation Recommendations
To mitigate this vulnerability, organizations should avoid using the app-based installation process over untrusted or public networks. Installation should be performed in a secure, isolated network environment where traffic interception is minimized. Network segmentation can limit exposure by isolating device setup traffic from sensitive network segments. Employing VPNs or encrypted tunnels during device setup can help protect credentials from interception. Monitoring network traffic for unusual activity during and after installation can detect potential exploitation attempts. Users should regularly update device firmware and monitor Linksys advisories for patches addressing this issue. If possible, consider alternative setup methods that do not transmit sensitive information in cleartext. Additionally, changing Wi-Fi passwords immediately after installation and restricting administrative access to the devices can reduce risk.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, India, Brazil
CVE-2024-40750: n/a
Description
CVE-2024-40750 is a medium-severity vulnerability affecting Linksys Velop Pro 6E devices (models MX6200_1. 0. 8. 215731 and 7 1. 0. 10. 215314). During app-based installation, these devices transmit Wi-Fi passwords in cleartext over the public Internet, exposing sensitive credentials to interception. This vulnerability stems from improper handling of sensitive data (CWE-312). Exploitation requires local access with low privileges and no user interaction, but the attack vector is local network-based.
AI-Powered Analysis
Technical Analysis
CVE-2024-40750 identifies a vulnerability in Linksys Velop Pro 6E mesh Wi-Fi systems, specifically versions MX6200_1.0.8.215731 and 7 1.0.10.215314. The flaw involves the transmission of Wi-Fi passwords in cleartext over the public Internet during the app-based installation process. This means that when users set up their devices using the official app, the Wi-Fi credentials are sent without encryption, exposing them to interception by attackers monitoring the network traffic. The vulnerability is classified under CWE-312, which relates to the cleartext storage or transmission of sensitive information. The CVSS 3.1 base score is 5.3 (medium), reflecting that the attack vector is local (AV:L), requires low privileges (PR:L), and no user interaction (UI:N) is needed. The impact affects confidentiality, integrity, and availability to a limited degree (C:L/I:L/A:L). No patches or fixes have been released at the time of publication, and there are no known exploits in the wild. This vulnerability could allow attackers on the same local network or with access to the communication path to capture Wi-Fi passwords, potentially enabling unauthorized network access and further attacks.
Potential Impact
The primary impact of this vulnerability is the exposure of Wi-Fi passwords during device setup, which compromises the confidentiality of network credentials. Attackers who intercept these cleartext transmissions can gain unauthorized access to the victim’s Wi-Fi network, potentially leading to further network intrusion, data theft, or lateral movement within the network. Although the vulnerability requires local network access or the ability to monitor traffic between the device and the app, the risk is significant in environments where network traffic is not adequately segmented or encrypted. The integrity and availability impacts are limited but present, as attackers with network access could disrupt or manipulate network traffic. Organizations relying on Linksys Velop Pro 6E devices may face increased risk of unauthorized access, especially in enterprise or sensitive environments where Wi-Fi security is critical. The lack of patches increases exposure duration, emphasizing the need for interim mitigations.
Mitigation Recommendations
To mitigate this vulnerability, organizations should avoid using the app-based installation process over untrusted or public networks. Installation should be performed in a secure, isolated network environment where traffic interception is minimized. Network segmentation can limit exposure by isolating device setup traffic from sensitive network segments. Employing VPNs or encrypted tunnels during device setup can help protect credentials from interception. Monitoring network traffic for unusual activity during and after installation can detect potential exploitation attempts. Users should regularly update device firmware and monitor Linksys advisories for patches addressing this issue. If possible, consider alternative setup methods that do not transmit sensitive information in cleartext. Additionally, changing Wi-Fi passwords immediately after installation and restricting administrative access to the devices can reduce risk.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-07-09T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6cb1b7ef31ef0b56817f
Added to database: 2/25/2026, 9:42:09 PM
Last enriched: 2/26/2026, 6:51:12 AM
Last updated: 2/26/2026, 8:01:58 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.