First published: Mon Mar 05 2018(Updated: )
An issue was discovered in D-Link mydlink+ 3.8.5 build 259 for DCS-933L 1.05.04 and DCS-934L 1.05.04 devices. The mydlink+ app sends the username and password for connected D-Link cameras (such as DCS-933L and DCS-934L) unencrypted from the app to the camera, allowing attackers to obtain these credentials and gain control of the camera including the ability to view the camera's stream and make changes without the user's knowledge.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-link Mydlink\+ | =3.8.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7698 is considered a high severity vulnerability due to the unencrypted transmission of sensitive credentials.
To mitigate CVE-2018-7698, users should update the D-Link mydlink+ app to the latest version and avoid using outdated versions of connected devices.
CVE-2018-7698 primarily affects D-Link DCS-933L and DCS-934L camera devices when used with the mydlink+ app version 3.8.5.
CVE-2018-7698 allows attackers to intercept and obtain the unencrypted usernames and passwords of users connected to vulnerable D-Link cameras.
Yes, CVE-2018-7698 can be exploited remotely by attackers who can intercept the traffic between the mydlink+ app and the vulnerable camera.