CVE-2024-40750: n/a
Linksys Velop Pro 6E 1.0.8 MX6200_1.0.8.215731 and 7 1.0.10.215314 devices send cleartext Wi-Fi passwords over the public Internet during app-based installation.
AI Analysis
Technical Summary
CVE-2024-40750 identifies a vulnerability in Linksys Velop Pro 6E mesh Wi-Fi systems, specifically versions MX6200_1.0.8.215731 and 7 1.0.10.215314. The flaw involves the transmission of Wi-Fi passwords in cleartext over the public Internet during the app-based installation process. This means that when users set up their devices using the official app, the Wi-Fi credentials are sent without encryption, exposing them to interception by attackers monitoring the network traffic. The vulnerability is classified under CWE-312, which relates to the cleartext storage or transmission of sensitive information. The CVSS 3.1 base score is 5.3 (medium), reflecting that the attack vector is local (AV:L), requires low privileges (PR:L), and no user interaction (UI:N) is needed. The impact affects confidentiality, integrity, and availability to a limited degree (C:L/I:L/A:L). No patches or fixes have been released at the time of publication, and there are no known exploits in the wild. This vulnerability could allow attackers on the same local network or with access to the communication path to capture Wi-Fi passwords, potentially enabling unauthorized network access and further attacks.
Potential Impact
The primary impact of this vulnerability is the exposure of Wi-Fi passwords during device setup, which compromises the confidentiality of network credentials. Attackers who intercept these cleartext transmissions can gain unauthorized access to the victim’s Wi-Fi network, potentially leading to further network intrusion, data theft, or lateral movement within the network. Although the vulnerability requires local network access or the ability to monitor traffic between the device and the app, the risk is significant in environments where network traffic is not adequately segmented or encrypted. The integrity and availability impacts are limited but present, as attackers with network access could disrupt or manipulate network traffic. Organizations relying on Linksys Velop Pro 6E devices may face increased risk of unauthorized access, especially in enterprise or sensitive environments where Wi-Fi security is critical. The lack of patches increases exposure duration, emphasizing the need for interim mitigations.
Mitigation Recommendations
To mitigate this vulnerability, organizations should avoid using the app-based installation process over untrusted or public networks. Installation should be performed in a secure, isolated network environment where traffic interception is minimized. Network segmentation can limit exposure by isolating device setup traffic from sensitive network segments. Employing VPNs or encrypted tunnels during device setup can help protect credentials from interception. Monitoring network traffic for unusual activity during and after installation can detect potential exploitation attempts. Users should regularly update device firmware and monitor Linksys advisories for patches addressing this issue. If possible, consider alternative setup methods that do not transmit sensitive information in cleartext. Additionally, changing Wi-Fi passwords immediately after installation and restricting administrative access to the devices can reduce risk.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, India, Brazil
CVE-2024-40750: n/a
Description
Linksys Velop Pro 6E 1.0.8 MX6200_1.0.8.215731 and 7 1.0.10.215314 devices send cleartext Wi-Fi passwords over the public Internet during app-based installation.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-40750 identifies a vulnerability in Linksys Velop Pro 6E mesh Wi-Fi systems, specifically versions MX6200_1.0.8.215731 and 7 1.0.10.215314. The flaw involves the transmission of Wi-Fi passwords in cleartext over the public Internet during the app-based installation process. This means that when users set up their devices using the official app, the Wi-Fi credentials are sent without encryption, exposing them to interception by attackers monitoring the network traffic. The vulnerability is classified under CWE-312, which relates to the cleartext storage or transmission of sensitive information. The CVSS 3.1 base score is 5.3 (medium), reflecting that the attack vector is local (AV:L), requires low privileges (PR:L), and no user interaction (UI:N) is needed. The impact affects confidentiality, integrity, and availability to a limited degree (C:L/I:L/A:L). No patches or fixes have been released at the time of publication, and there are no known exploits in the wild. This vulnerability could allow attackers on the same local network or with access to the communication path to capture Wi-Fi passwords, potentially enabling unauthorized network access and further attacks.
Potential Impact
The primary impact of this vulnerability is the exposure of Wi-Fi passwords during device setup, which compromises the confidentiality of network credentials. Attackers who intercept these cleartext transmissions can gain unauthorized access to the victim’s Wi-Fi network, potentially leading to further network intrusion, data theft, or lateral movement within the network. Although the vulnerability requires local network access or the ability to monitor traffic between the device and the app, the risk is significant in environments where network traffic is not adequately segmented or encrypted. The integrity and availability impacts are limited but present, as attackers with network access could disrupt or manipulate network traffic. Organizations relying on Linksys Velop Pro 6E devices may face increased risk of unauthorized access, especially in enterprise or sensitive environments where Wi-Fi security is critical. The lack of patches increases exposure duration, emphasizing the need for interim mitigations.
Mitigation Recommendations
To mitigate this vulnerability, organizations should avoid using the app-based installation process over untrusted or public networks. Installation should be performed in a secure, isolated network environment where traffic interception is minimized. Network segmentation can limit exposure by isolating device setup traffic from sensitive network segments. Employing VPNs or encrypted tunnels during device setup can help protect credentials from interception. Monitoring network traffic for unusual activity during and after installation can detect potential exploitation attempts. Users should regularly update device firmware and monitor Linksys advisories for patches addressing this issue. If possible, consider alternative setup methods that do not transmit sensitive information in cleartext. Additionally, changing Wi-Fi passwords immediately after installation and restricting administrative access to the devices can reduce risk.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-07-09T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6cb1b7ef31ef0b56817f
Added to database: 2/25/2026, 9:42:09 PM
Last enriched: 2/26/2026, 6:51:12 AM
Last updated: 4/12/2026, 5:07:21 PM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.