The tested version of Dominion Voting Systems ImageCast X’s on-screen application hash display feature, audit log export, and application export functionality rely on self-attestation mechanisms. An attacker could leverage this vulnerability to disguise malicious applications on a device.
The register contents used for attestation or measurement reporting data to verify boot flow are modifiable by an adversary.
Link | Tags |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-154-01 | us government resource third party advisory mitigation |