CVE-2024-7391: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in ChargePoint Home Flex
ChargePoint Home Flex Bluetooth Low Energy Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of ChargePoint Home Flex charging devices. User interaction is required to exploit this vulnerability. The specific flaw exists within the Wi-Fi setup logic. By connecting to the device over Bluetooth Low Energy during the setup process, an attacker can obtain Wi-Fi credentials. An attacker can leverage this vulnerability to disclose credentials and gain access to the device owner's Wi-Fi network. Was ZDI-CAN-21454.
AI Analysis
Technical Summary
CVE-2024-7391 is an information disclosure vulnerability identified in the ChargePoint Home Flex electric vehicle charging station, specifically in version 5.5.3.13. The vulnerability arises from the device's Wi-Fi setup logic, which uses Bluetooth Low Energy (BLE) communication. During the setup process, an attacker who is network-adjacent—meaning within BLE range—can connect to the device and extract sensitive Wi-Fi credentials. This flaw is classified under CWE-200, indicating exposure of sensitive information to unauthorized actors. Exploitation requires user interaction, such as initiating or being involved in the setup process, and the attacker must be physically near the device to leverage BLE connectivity. The disclosed Wi-Fi credentials could allow the attacker to gain unauthorized access to the victim’s Wi-Fi network, potentially enabling further attacks on other devices connected to that network. The CVSS v3.0 base score is 2.6, reflecting low severity due to the requirement for user interaction, high attack complexity, and limited impact confined to confidentiality. No integrity or availability impacts are noted. No patches or known exploits have been reported at the time of publication, but the vulnerability was tracked by the Zero Day Initiative as ZDI-CAN-21454. This vulnerability highlights risks in IoT device setup procedures that expose sensitive network information over short-range wireless protocols.
Potential Impact
The primary impact of CVE-2024-7391 is the potential exposure of Wi-Fi credentials, which compromises the confidentiality of the victim’s network. If an attacker obtains these credentials, they could gain unauthorized access to the Wi-Fi network, potentially leading to lateral movement within the network, data interception, or launching further attacks against other connected devices. However, the requirement for user interaction and physical proximity reduces the likelihood of widespread exploitation. The vulnerability does not affect device integrity or availability, so direct disruption of charging services is unlikely. Organizations deploying ChargePoint Home Flex devices, especially in residential or semi-public environments, face increased risk of network intrusion if attackers can physically approach devices during setup. The exposure could be particularly impactful in environments where Wi-Fi networks are trusted for sensitive operations or where network segmentation is weak. Overall, the threat is moderate but should not be ignored given the growing adoption of EV charging infrastructure and IoT devices in critical environments.
Mitigation Recommendations
1. Limit physical access to ChargePoint Home Flex devices during the Wi-Fi setup process to trusted personnel only, preventing unauthorized BLE connections. 2. Conduct the Wi-Fi setup in secure environments where attackers cannot be in close proximity. 3. Segment IoT and EV charging devices on separate VLANs or isolated networks to contain potential breaches and prevent lateral movement if Wi-Fi credentials are compromised. 4. Disable Bluetooth Low Energy connectivity on the device after setup is complete, if supported, to reduce attack surface. 5. Monitor network traffic for unusual connections or unauthorized devices joining the Wi-Fi network. 6. Stay informed about vendor updates or patches addressing this vulnerability and apply them promptly once available. 7. Educate users about the risks of setting up devices in unsecured or public areas and the importance of controlling physical access during setup. 8. Consider using strong Wi-Fi authentication methods and regularly rotating Wi-Fi credentials to limit exposure duration.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Netherlands, Norway, Sweden, Australia, Japan
CVE-2024-7391: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in ChargePoint Home Flex
Description
ChargePoint Home Flex Bluetooth Low Energy Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of ChargePoint Home Flex charging devices. User interaction is required to exploit this vulnerability. The specific flaw exists within the Wi-Fi setup logic. By connecting to the device over Bluetooth Low Energy during the setup process, an attacker can obtain Wi-Fi credentials. An attacker can leverage this vulnerability to disclose credentials and gain access to the device owner's Wi-Fi network. Was ZDI-CAN-21454.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-7391 is an information disclosure vulnerability identified in the ChargePoint Home Flex electric vehicle charging station, specifically in version 5.5.3.13. The vulnerability arises from the device's Wi-Fi setup logic, which uses Bluetooth Low Energy (BLE) communication. During the setup process, an attacker who is network-adjacent—meaning within BLE range—can connect to the device and extract sensitive Wi-Fi credentials. This flaw is classified under CWE-200, indicating exposure of sensitive information to unauthorized actors. Exploitation requires user interaction, such as initiating or being involved in the setup process, and the attacker must be physically near the device to leverage BLE connectivity. The disclosed Wi-Fi credentials could allow the attacker to gain unauthorized access to the victim’s Wi-Fi network, potentially enabling further attacks on other devices connected to that network. The CVSS v3.0 base score is 2.6, reflecting low severity due to the requirement for user interaction, high attack complexity, and limited impact confined to confidentiality. No integrity or availability impacts are noted. No patches or known exploits have been reported at the time of publication, but the vulnerability was tracked by the Zero Day Initiative as ZDI-CAN-21454. This vulnerability highlights risks in IoT device setup procedures that expose sensitive network information over short-range wireless protocols.
Potential Impact
The primary impact of CVE-2024-7391 is the potential exposure of Wi-Fi credentials, which compromises the confidentiality of the victim’s network. If an attacker obtains these credentials, they could gain unauthorized access to the Wi-Fi network, potentially leading to lateral movement within the network, data interception, or launching further attacks against other connected devices. However, the requirement for user interaction and physical proximity reduces the likelihood of widespread exploitation. The vulnerability does not affect device integrity or availability, so direct disruption of charging services is unlikely. Organizations deploying ChargePoint Home Flex devices, especially in residential or semi-public environments, face increased risk of network intrusion if attackers can physically approach devices during setup. The exposure could be particularly impactful in environments where Wi-Fi networks are trusted for sensitive operations or where network segmentation is weak. Overall, the threat is moderate but should not be ignored given the growing adoption of EV charging infrastructure and IoT devices in critical environments.
Mitigation Recommendations
1. Limit physical access to ChargePoint Home Flex devices during the Wi-Fi setup process to trusted personnel only, preventing unauthorized BLE connections. 2. Conduct the Wi-Fi setup in secure environments where attackers cannot be in close proximity. 3. Segment IoT and EV charging devices on separate VLANs or isolated networks to contain potential breaches and prevent lateral movement if Wi-Fi credentials are compromised. 4. Disable Bluetooth Low Energy connectivity on the device after setup is complete, if supported, to reduce attack surface. 5. Monitor network traffic for unusual connections or unauthorized devices joining the Wi-Fi network. 6. Stay informed about vendor updates or patches addressing this vulnerability and apply them promptly once available. 7. Educate users about the risks of setting up devices in unsecured or public areas and the importance of controlling physical access during setup. 8. Consider using strong Wi-Fi authentication methods and regularly rotating Wi-Fi credentials to limit exposure duration.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- zdi
- Date Reserved
- 2024-08-01T20:11:51.555Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 699f6c16b7ef31ef0b55fc4d
Added to database: 2/25/2026, 9:39:34 PM
Last enriched: 2/26/2026, 3:37:38 AM
Last updated: 4/11/2026, 9:28:44 PM
Views: 25
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.