- BECKER NEWS - Kyle Becker - JUN 3, 2022 -

A highly anticipated report issued Friday by the Cybersecurity and Infrastructure Agency, also known as CISA, is providing official documentation of the major security flaws posed by Dominion Voting Systems Machines. It comes nearly two years after the 2020 presidential election, which the agency had called the “most secure election in history.”
CLIQUE AQUI E CONHEÇA OS LIVROS DE MINHA AUTORIA >>>
https://www.heitordepaola.online/meuslivros
While the CISA report states that it has “no evidence that these vulnerabilities have been exploited in any elections,” it nonetheless highlights at least nine concrete, alarming security vulnerabilities. The CISA report was issued based on the analysis of J. Alex Halderman of the University of Michigan, and Drew Springall of Auburn University.
The report states that the security advisery affects the following versions of the Dominion Voting Systems ImageCast X software are known to be affected (other versions were not able to be tested): ImageCast X firmware based on Android 5.1, as used in Dominion Democracy Suite Voting System Version 5.5-A and ImageCast X application Versions 5.5.10.30 and 5.5.10.32, as used in Dominion Democracy Suite Voting System Version 5.5-A.
The vulnerability overview lists nine different security concerns. It is important to go beyond the advisery document itself to get a clear picture of the vulnerability. The security vulnerabilities justify the concerns of election observers who pointed out that admin rights could be used to override security features and that the system could potentially be hijacked due to “spoofing.”
The security vulnerabilities are listed below:
Advertisements
The tested version of ImageCast X does not validate application signatures to a trusted root certificate.
The tested version of ImageCast X’s on-screen application hash display feature, audit log export, and application export functionality rely on self-attestation mechanisms. An attacker could leverage this vulnerability to disguise malicious applications on a device.
The tested version of ImageCast X has a Terminal Emulator application which could be leveraged by an attacker to gain elevated privileges on a device and/or install malicious code.
The tested version of ImageCast X allows for rebooting into Android Safe Mode, which allows an attacker to directly access the operating system. An attacker could leverage this vulnerability to escalate privileges on a device and/or install malicious code.
The tested version of ImageCast X can be manipulated to cause arbitrary code execution by specially crafted election definition files. An attacker could leverage this vulnerability to spread malicious code to ImageCast X devices from the EMS.
Applications on the tested version of ImageCast X can execute code with elevated privileges by exploiting a system level service. An attacker could leverage this vulnerability to escalate privileges on a device and/or install malicious code.
The authentication mechanism used by technicians on the tested version of ImageCast X is susceptible to forgery. An attacker with physical access may use this to gain administrative privileges on a device and install malicious code or perform arbitrary administrative actions.
The authentication mechanism used by poll workers to administer voting using the tested version of ImageCast X can expose cryptographic secrets used to protect election information. An attacker could leverage this vulnerability to gain access to sensitive information and perform privileged actions, potentially affecting other election equipment.
The authentication mechanism used by voters to activate a voting session on the tested version of ImageCast X is susceptible to forgery. An attacker could leverage this vulnerability to print an arbitrary number of ballots without authorization.
LEIA MAIS >
CLIQUE AQUI E CONHEÇA OS LIVROS DE MINHA AUTORIA >>>
https://www.heitordepaola.online/meuslivros