|

Recent CISA Report Identifies Massive System Vulnerabilities in Dominion Voting Systems Used in Georgia Then Claims There’s No Evidence These Vulnerabilities Were Abused in 2020 – But How Can They Be Trusted?

Recent CISA Report Identifies Massive System Vulnerabilities in Dominion Voting Systems Used in Georgia Then Claims There’s No Evidence These Vulnerabilities Were Abused in 2020 – But How Can They Be Trusted?

Weeks before the 2020 Election, leaders in the government confirmed in agreement that the US Election would be the safest in US history.  This list included some major league corrupt actors in the US.

Corrupt FBI Director Chris Wray and Now Fired CISA Director Chris Krebs Produced Video Before Election Declaring 2020 Election Secure

This announcement was not backed by any real information as time would tell.  A short time after the election it was reported that there was a major security breach with SolarWinds Orion products that were used by Dominion Voting machines.  This breach made these corrupt government agents look foolish in their prior claims.

HUGE UPDATE: Dominion Voting Systems Uses SolarWinds — Same Company CISA in Rare Warning Reported Was Breached, Compromised and Should Be Disconnected!!

At about the same time an investigation was taking place in Georgia of the Dominion voting machines used there.  The individual who was performing the investigation was no fan of President Trump.  He released the report from his work and this was covered up immediately by corrupt Obama Judge Amy Totenberg, who we wrote about this morning.  Judge Totenberg has withheld this report to this day.  This is just another example of judicial overreach and corruption and coverup of the 2020 Election steal.

Obama Judge Amy Totenberg Sealed Halderman Report Showing Material Voting Machine Issues in Georgia – This Week CISA Released Junk Rebuttal to Report Still Not Released

On Friday the government agency, CISA, released a report that was in response to the issues identified in the Halderman report.  We know this because the CISA report says so:

J. Alex Halderman, University of Michigan, and Drew Springall, Auburn University, reported these vulnerabilities to CISA.

The report then lists a number of significant issues with the election system that ran the 2020 Election in Georgia.  In the corporate world a system like this would be thrown out and replaced before ever being put in use, but his is the state government in Georgia and we have seen over the past few years how inept and unprincipled these state governments can be.

The corrupt actors in Georgia, including the Secretary of State and Judge Totenberg, ensured that the Domionion system remains in place with the material issues included in the Halderman report and described in the CISA report.

Here is a list of material weaknesses embedding the Dominion system used in Georgia according to CISA.  In it’s vulnerability review CISA now admits that the Domion Voting Systems allow for access from almost anyone, allows for malicious software to be loaded a device, allows for attackers to use a different mode on  the system, and print a number of ballots without detection:

NOTE: Mitigations to reduce the risk of exploitation of these vulnerabilities can be found in Section 3 of this document.

2.2.1    IMPROPER VERIFICATION OF CRYPTOGRAPHIC SIGNATURE CWE-347

The tested version of ImageCast X does not validate application signatures to a trusted root certificate. Use of a trusted root certificate ensures software installed on a device is traceable to, or verifiable against, a cryptographic key provided by the manufacturer to detect tampering. An attacker could leverage this vulnerability to install malicious code, which could also be spread to other vulnerable ImageCast X devices via removable media.

CVE-2022-1739 has been assigned to this vulnerability.

2.2.2    MUTABLE ATTESTATION OR MEASUREMENT REPORTING DATA CWE-1283

The tested version of ImageCast X’s on-screen application hash display feature, audit log export, and application export functionality rely on self-attestation mechanisms. An attacker could leverage this vulnerability to disguise malicious applications on a device.

CVE-2022-1740 has been assigned to this vulnerability.

2.2.3    HIDDEN FUNCTIONALITY CWE-912

The tested version of ImageCast X has a Terminal Emulator application which could be leveraged by an attacker to gain elevated privileges on a device and/or install malicious code.

CVE-2022-1741 has been assigned to this vulnerability.

2.2.4    IMPROPER PROTECTION OF ALTERNATE PATH CWE-424

The tested version of ImageCast X allows for rebooting into Android Safe Mode, which allows an attacker to directly access the operating system. An attacker could leverage this vulnerability to escalate privileges on a device and/or install malicious code.

CVE-2022-1742 has been assigned to this vulnerability.

2.2.5    PATH TRAVERSAL: ‘../FILEDIR’ CWE-24

The tested version of ImageCast X can be manipulated to cause arbitrary code execution by specially crafted election definition files. An attacker could leverage this vulnerability to spread malicious code to ImageCast X devices from the EMS.

CVE-2022-1743 has been assigned to this vulnerability.

2.2.6    EXECUTION WITH UNNECESSARY PRIVILEGES CWE-250

Applications on the tested version of ImageCast X can execute code with elevated privileges by exploiting a system level service. An attacker could leverage this vulnerability to escalate privileges on a device and/or install malicious code.

CVE-2022-1744 has been assigned to this vulnerability.

2.2.7    AUTHENTICATION BYPASS BY SPOOFING CWE-290

The authentication mechanism used by technicians on the tested version of ImageCast X is susceptible to forgery. An attacker with physical access may use this to gain administrative privileges on a device and install malicious code or perform arbitrary administrative actions.

CVE-2022-1745 has been assigned to this vulnerability.

2.2.8    INCORRECT PRIVILEGE ASSIGNMENT CWE-266

The authentication mechanism used by poll workers to administer voting using the tested version of ImageCast X can expose cryptographic secrets used to protect election information. An attacker could leverage this vulnerability to gain access to sensitive information and perform privileged actions, potentially affecting other election equipment.

CVE-2022-1746 has been assigned to this vulnerability.

2.2.9    ORIGIN VALIDATION ERROR CWE-346

The authentication mechanism used by voters to activate a voting session on the tested version of ImageCast X is susceptible to forgery. An attacker could leverage this vulnerability to print an arbitrary number of ballots without authorization.

CVE-2022-1747 has been assigned to this vulnerability.

Professor Halderman notes in a previous presentation the many ways that US elections are at risk for manipulation.

CISA in their report in one of the first sentences claims the following:

CISA has no evidence that these vulnerabilities have been exploited in any elections.

This means that they could have been used in the 2020 Election and no doubt they were.

The CISA report goes on to say this:

Exploitation of these vulnerabilities would require physical access to individual ImageCast X devices, access to the Election Management System (EMS), or the ability to modify files before they are uploaded to ImageCast X devices.

Any of these things could have occurred.  It looks like the CISA is trying to cover its bases before the Halderman report is released.  What a corrupt government we have. 

The post Recent CISA Report Identifies Massive System Vulnerabilities in Dominion Voting Systems Used in Georgia Then Claims There’s No Evidence These Vulnerabilities Were Abused in 2020 – But How Can They Be Trusted? appeared first on The Gateway Pundit.

Go to Source
Author: Joe Hoft