The authentication mechanism used by poll workers to administer voting using the tested version of Dominion Voting Systems ImageCast X can expose cryptographic secrets used to protect election information. An attacker could leverage this vulnerability to gain access to sensitive information and perform privileged actions, potentially affecting other election equipment.
A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor.
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Link | Tags |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-154-01 | us government resource third party advisory mitigation |