translation

This is an AI translated post.

해리슨 블로그

Linksys Router Security Vulnerability Found: Risk of User Data Exposure

  • Writing language: Korean
  • Base country: All countries country-flag

Select Language

  • English
  • 汉语
  • Español
  • Bahasa Indonesia
  • Português
  • Русский
  • 日本語
  • 한국어
  • Deutsch
  • Français
  • Italiano
  • Türkçe
  • Tiếng Việt
  • ไทย
  • Polski
  • Nederlands
  • हिन्दी
  • Magyar

Summarized by durumis AI

  • Belgian consumer organization Testaankoop has discovered a serious security vulnerability in the Linksys Velop Pro 6E and 7 models that sends Wi-Fi login credentials unencrypted to Amazon servers.
  • This vulnerability increases the risk of man-in-the-middle attacks, where an attacker can intercept communication between the router and server, stealing SSID names and passwords, threatening user privacy and network security.
  • Testaankoop informed Linksys about the issue, but it wasn't resolved through a firmware update. Therefore, they do not recommend using these router models and users should be extra cautious with their security, including keeping the router firmware up to date and using strong passwords.

Recently, Testaankoop, a Belgian consumer organization, discovered a shocking security vulnerability. Two Linksys mesh router models are sending Wi-Fi login information to Amazon (AWS) servers unencrypted.

The router models in question

  • Linksys Velop Pro 6E
  • Linksys Velop Pro 7

Details of the vulnerability

Testaankoop discovered the issue during routine installation checks. Multiple data packets were being sent to AWS servers in the United States, containing sensitive information such as:

1. The configured SSID name and password (unencrypted plain text)
2. Network identification tokens within a large database
3. Access tokens for user sessions

This information exposure could potentially increase the risk of man-in-the-middle (MITM) attacks.

The risk of man-in-the-middle attacks

A man-in-the-middle attack is a security breach where an attacker intercepts communications between a Linksys router and an Amazon server, potentially capturing sensitive information. In this case, the attacker could capture the Wi-Fi network name (SSID) and password transmitted in plain text. This allows the attacker to read or modify this critical information, potentially granting unauthorized access to the network.

Connection to recent security incidents

The discovery of this vulnerability is even more alarming in light of the recent MITM attack incident involving KT in South Korea. The fact that KT, a major telecommunications company, attempted a man-in-the-middle attack against its users has already raised serious concerns for many. The discovery of a similar vulnerability in routers from Linksys, a global network equipment manufacturer, is a serious issue that further increases user anxiety.

This goes beyond a simple technical flaw. It raises questions of corporate ethics and responsibility, as companies that should be safeguarding user privacy and network security are putting that information at risk. It is particularly shocking that a major company like Linksys would overlook such fundamental security issues.

Linksys' response

Testaankoop alerted Linksys about this issue in November 2023, but effective action was not taken. Linksys released a firmware update after the initial warning, but it did not address the concerns raised.

The tested Velop 6E and 7 models were using the latest firmware at the time:

  • Velop 6E: Firmware V 1.0.8 MX6200_1.0.8.215731
  • Velop Pro 7: Firmware 1.0.10.215314

Recommendations for users

Testaankoop recommends the following steps for users who already own these routers:

1. Change the Wi-Fi network name and password through the web interface instead of the app.
2. This will prevent the SSID name and password from being transmitted as readable text.

Conclusion

Testaankoop emphasizes that this issue persists and strongly advises against purchasing Linksys Velop Pro WiFi 6E and Pro 7. They warn of the "risk of serious network intrusion and data loss."

This vulnerability poses a serious threat to both individual users and small office environments. There is still no official response from Linksys.

The recent KT MITM attack incident and the discovery of this vulnerability in Linksys routers serve as a reminder of the importance of network security. This means that users need to be more vigilant about their digital security.

As security experts, we always recommend that users keep their router firmware up to date, use strong passwords, and regularly review their security settings. Additionally, it is necessary to reconsider using these models until these security issues are resolved. Furthermore, responsible attitudes and swift responses from manufacturers and service providers are more important than ever.

해리슨
해리슨 블로그
해리슨의 깜짝 블로그
해리슨
KT Hacking Incident: Man-in-the-Middle Attack at the National Telecommunications Network Level and its Impact The KT customer device hacking incident is a serious incident that requires a review of Korea's overall cybersecurity system, as it is a man-in-the-middle attack at the national telecommunications network level. KT directly hacked customers' PCs to steal

July 13, 2024

Critical Flaw Discovered in 30-Year-Old RADIUS Protocol 'BlastRADIUS', a serious vulnerability in the RADIUS protocol used for 30 years, has been discovered, posing a threat to network security. This vulnerability allows attackers to bypass authentication and escalate privileges by exploiting MD5 hash collisio

July 13, 2024

DigiCert Certificate Crisis: Urgent SSL/TLS Security Issue Requires Action Within 24 Hours
DigiCert Certificate Crisis: Urgent SSL/TLS Security Issue Requires Action Within 24 Hours A portion (0.4%) of TLS certificates issued by DigiCert has been found to have issues and needs to be revoked and reissued. If you are using DigiCert's custom certificates on cloud services such as GCP, you need to take immediate action. Please refer to t

July 31, 2024

The Paradox of Leading AI Models, Transparency The lack of transparency in cutting-edge AI systems has emerged as a serious problem. Researchers at Stanford University analyzed 10 AI systems, including GPT-4, and concluded that there are no models that transparently disclose information such as data s
Byungchae Ryan Son
Byungchae Ryan Son
The lack of transparency in cutting-edge AI systems has emerged as a serious problem. Researchers at Stanford University analyzed 10 AI systems, including GPT-4, and concluded that there are no models that transparently disclose information such as data s
Byungchae Ryan Son
Byungchae Ryan Son

May 14, 2024

Ambiguity Towards Digital Privacy The privacy controversy surrounding TikTok exposes concerns regarding user data collection and utilization. Businesses should respond to user demands for privacy by providing clear and concise privacy policies, and offering intuitive features that allow u
Byungchae Ryan Son
Byungchae Ryan Son
Byungchae Ryan Son
Byungchae Ryan Son

May 10, 2024

Wi-Fi 7, Revolutionizing Next-Generation Wireless Communication - A Journey Toward Enhanced Speed and Reliability Wi-Fi 7 is a next-generation wireless communication technology that offers ultra-high data transfer speeds of up to 46 Gbps in theory. With its 320 MHz bandwidth, 4096QAM modulation, and MLO technology, it delivers speeds 4.8 times faster than Wi-Fi 6, as
durumis AI News Japan
durumis AI News Japan
An image related to Wi-Fi 7
durumis AI News Japan
durumis AI News Japan

May 12, 2024

Netscout Releases Latest Threat Intelligence Report: Geopolitical Uncertainty Fuels Rise in DDoS Attacks More than 7 million DDoS attacks were launched in the second half of 2023, driven by an increase in hacktivist group activity and DNS waterhole attacks. According to Netscout's report, the gaming and gambling industries have suffered the most, with hackti
스타트업 커뮤니티 씬디스 (SeenThis.kr)
스타트업 커뮤니티 씬디스 (SeenThis.kr)
스타트업 커뮤니티 씬디스 (SeenThis.kr)
스타트업 커뮤니티 씬디스 (SeenThis.kr)

April 26, 2024

Okayama Prefectural Mental Health Care Center: Possible Data Breach Affecting Nearly 40,000 Patients Due to Cyberattack The information system of Okayama Prefectural Mental Health Care Center was attacked by cybercriminals, potentially exposing the personal information of 40,000 patients. The hospital plans to apologize to those potentially affected, report the incident to
durumis AI News Japan
durumis AI News Japan
durumis AI News Japan
durumis AI News Japan

June 11, 2024

Splunk Releases 2024 Security State Report According to Splunk's 2024 Security State Report, 93% of organizations are using generative AI, but 34% haven't established policies yet. Generative AI offers new opportunities for both cybersecurity professionals and attackers, and it is important to und
스타트업 커뮤니티 씬디스 (SeenThis.kr)
스타트업 커뮤니티 씬디스 (SeenThis.kr)
스타트업 커뮤니티 씬디스 (SeenThis.kr)
스타트업 커뮤니티 씬디스 (SeenThis.kr)

May 13, 2024