Jack Heart on VT Radio
470 toxic waste leaks since 2020, 1000 train wrecks in one year, "and no one's getting fat except Mama" Wall Street...
Vulnerabilities Affecting Dominion Voting Systems ImageCast X
Last Revised
June 03, 2022
Alert Code
ICSA-22-154-01
1. SUMMARY
This advisory identifies vulnerabilities affecting versions of the Dominion Voting Systems Democracy Suite ImageCast X, which is an in-person voting system used to allow voters to mark their ballot. The ImageCast X can be configured to allow a voter to produce a paper record or to record votes electronically. While these vulnerabilities present risks that should be mitigated as soon as possible, CISA has no evidence that these vulnerabilities have been exploited in any elections.
Exploitation of these vulnerabilities would require physical access to individual ImageCast X devices, access to the Election Management System (EMS), or the ability to modify files before they are uploaded to ImageCast X devices. Jurisdictions can prevent and/or detect the exploitation of these vulnerabilities by diligently applying the mitigations recommended in this advisory, including technical, physical, and operational controls that limit unauthorized access or manipulation of voting systems. Many of these mitigations are already typically standard practice in jurisdictions where these devices are in use and can be enhanced to further guard against exploitation of these vulnerabilities.
2. TECHNICAL DETAILS
2.1 AFFECTED PRODUCTS
The following versions of the Dominion Voting Systems ImageCast X software are known to be affected (other versions were not able to be tested):
ImageCast X firmware based on Android 5.1, as used in Dominion Democracy Suite Voting System Version 5.5-A
ImageCast X application Versions 5.5.10.30 and 5.5.10.32, as used in Dominion Democracy Suite Voting System Version 5.5-A
NOTE: After following the vendor’s procedure to upgrade the ImageCast X from Version 5.5.10.30 to 5.5.10.32, or after performing other Android administrative actions, the ImageCast X may be left in a configuration that could allow an attacker who can attach an external input device to escalate privileges and/or install malicious code. Instructions to check for and mitigate this condition are available from Dominion Voting Systems.
Any jurisdictions running ImageCast X are encouraged to contact Dominion Voting Systems to understand the vulnerability status of their specific implementation.
2.2 VULNERABILITY OVERVIEW
NOTE: Mitigations to reduce the risk of exploitation of these vulnerabilities can be found in Section 3 of this document.
2.2.1 IMPROPER VERIFICATION OF CRYPTOGRAPHIC SIGNATURE CWE-347
The tested version of ImageCast X does not validate application signatures to a trusted root certificate. Use of a trusted root certificate ensures software installed on a device is traceable to, or verifiable against, a cryptographic key provided by the manufacturer to detect tampering. An attacker could leverage this vulnerability to install malicious code, which could also be spread to other vulnerable ImageCast X devices via removable media.
CVE-2022-1739 has been assigned to this vulnerability.
2.2.2 MUTABLE ATTESTATION OR MEASUREMENT REPORTING DATA CWE-1283
The tested version of ImageCast X’s on-screen application hash display feature, audit log export, and application export functionality rely on self-attestation mechanisms. An attacker could leverage this vulnerability to disguise malicious applications on a device.
CVE-2022-1740 has been assigned to this vulnerability.
2.2.3 HIDDEN FUNCTIONALITY CWE-912
The tested version of ImageCast X has a Terminal Emulator application which could be leveraged by an attacker to gain elevated privileges on a device and/or install malicious code.
CVE-2022-1741 has been assigned to this vulnerability.
2.2.4 IMPROPER PROTECTION OF ALTERNATE PATH CWE-424
The tested version of ImageCast X allows for rebooting into Android Safe Mode, which allows an attacker to directly access the operating system. An attacker could leverage this vulnerability to escalate privileges on a device and/or install malicious code.
CVE-2022-1742 has been assigned to this vulnerability.
2.2.5 PATH TRAVERSAL: '../FILEDIR' CWE-24
The tested version of ImageCast X can be manipulated to cause arbitrary code execution by specially crafted election definition files. An attacker could leverage this vulnerability to spread malicious code to ImageCast X devices from the EMS.
CVE-2022-1743 has been assigned to this vulnerability.
2.2.6 EXECUTION WITH UNNECESSARY PRIVILEGES CWE-250
Applications on the tested version of ImageCast X can execute code with elevated privileges by exploiting a system level service. An attacker could leverage this vulnerability to escalate privileges on a device and/or install malicious code.
CVE-2022-1744 has been assigned to this vulnerability.
2.2.7 AUTHENTICATION BYPASS BY SPOOFING CWE-290
The authentication mechanism used by technicians on the tested version of ImageCast X is susceptible to forgery. An attacker with physical access may use this to gain administrative privileges on a device and install malicious code or perform arbitrary administrative actions.
CVE-2022-1745 has been assigned to this vulnerability.
2.2.8 INCORRECT PRIVILEGE ASSIGNMENT CWE-266
The authentication mechanism used by poll workers to administer voting using the tested version of ImageCast X can expose cryptographic secrets used to protect election information. An attacker could leverage this vulnerability to gain access to sensitive information and perform privileged actions, potentially affecting other election equipment.
CVE-2022-1746 has been assigned to this vulnerability.
2.2.9 ORIGIN VALIDATION ERROR CWE-346
The authentication mechanism used by voters to activate a voting session on the tested version of ImageCast X is susceptible to forgery. An attacker could leverage this vulnerability to print an arbitrary number of ballots without authorization.
CVE-2022-1747 has been assigned to this vulnerability.
2.3 BACKGROUND
CRITICAL INFRASTRUCTURE SECTORS Government Facilities / Election Infrastructure
COUNTRIES/AREAS DEPLOYED: Multiple
COMPANY HEADQUARTERS LOCATION: Denver, Colorado
2.4 RESEARCHER
J. Alex Halderman, University of Michigan, and Drew Springall, Auburn University, reported these vulnerabilities to CISA.
3. MITIGATIONS
CISA recommends election officials continue to take and further enhance defensive measures to reduce the risk of exploitation of these vulnerabilities. Specifically, for each election, election officials should:
Contact Dominion Voting Systems to determine which software and/or firmware updates need to be applied. Dominion Voting Systems reports to CISA that the above vulnerabilities have been addressed in subsequent software versions.
Ensure all affected devices are physically protected before, during, and after voting.
Ensure compliance with chain of custody procedures throughout the election cycle.
Ensure that ImageCast X and the Election Management System (EMS) are not connected to any external (i.e., Internet accessible) networks.
Ensure carefully selected protective and detective physical security measures (for example, locks and tamper-evident seals) are implemented on all affected devices, including on connected devices such as printers and connecting cables.
Close any background application windows on each ImageCast X device.
Use read-only media to update software or install files onto ImageCast X devices.
Use separate, unique passcodes for each poll worker card.
Ensure all ImageCast X devices are subjected to rigorous pre- and post-election testing.
Disable the “Unify Tabulator Security Keys” feature on the election management system and ensure new cryptographic keys are used for each election.
As recommended by Dominion Voting Systems, use the supplemental method to validate hashes on applications, audit log exports, and application exports.
Encourage voters to verify the human-readable votes on printout.
Conduct rigorous post-election tabulation audits of the human-readable portions of physical ballots and paper records, to include reviewing ballot chain of custody and conducting voter/ballot reconciliation procedures. These activities are especially crucial to detect attacks where the listed vulnerabilities are exploited such that a barcode is manipulated to be tabulated inconsistently with the human-readable portion of the paper ballot. (NOTE: If states and jurisdictions so choose, the ImageCast X provides the configuration option to produce ballots that do not print barcodes for tabulation.)
Vendor
Dominion Voting Systems
"Wailing Wall Street"
https://www.youtube.com/watch?v=R2I2mK_3_ns
Corrosion Of Conformity - Vote with a Bullet
The number in nations
The god in their hearts
The justice in swine
The devil in God
VOTE
This long hand that breaks our backs
Still casting shadows on all that we see
Unjustified...mercy killing is just a feeling
To keep our numbers from being free
(Chorus)
Prison for praise is not worth thinking
Sin is still in and our ballots are shrinking
So unleash the dogs - the only solution
Forgive and forget, fuck no
I'm talking about a revolution
The prophet man's got a needle in his hand
Draws his dreams from your soul - bleeding
Minds into sand
The year of the fear has arrived decades too late
And our right to stand and fight is now
Solely sealed in fate
(Chorus)
Prison for praise is not worth thinking
Sin is still in and our ballots are shrinking
So unleash the dogs - the only solution
Forgive and forget, fuck no
I'm talking about a revolution
One last chance mission with a vision
'cos our lives are just cards in their stack
Our time is short but theirs is shorter
How much longer can they hold us back
(Chorus)
Prison for praise - the obvious answer
Once had power mad - living disaster
Don't fuck with me 'cos I'm on a freedom train
That bears no name - this time
I'm voting with a bullet
This view they once knew made our nooses too tight
This justice in swine
This devil in god
So God bless my soul - I've got total control
And the crosshairs lined up dead in my sight
I'm voting with a bullet
https://onmilwaukee.com/articles/foxlegs
The above? The Foxx news business model. Curvy older good looking women to read the script to the 18 to 64 year old demographic. Notice I said read the script from a teleprompter.
Jack and Jonny reek of good Spiritual vibes on this video as truth is the Spirit of the wave function. Well done!
And Jack is so freeking cool with the dark lighting with his cigarette going as Me thinks I will take up smoking. LOL
But I can’t take up smoking since I am a cyclist planning to do Paris Brest Paris this July a 1200k bicycle race but alas I might as well take up smoking since my cycling club has mandated the vaxxine to ride a bicycle outside. No Paris trip for this guy!
Me at 66? I can cover 100 miles in about six and a half hours and maybe a bit faster. At 46, my fastest time as an ultra cyclist I could cover 200 miles easily in ten and a half hours but had no cash for Paris. Now I have the cash at 66 but for a vaxxine I can’t go to Paris. I am pissed. Jack calls them agglutinations. Apt term.
The vaxxine and cycling? My over 60 vaxxed pals are riding faster than I have ever seen them ride. No one has died. The vaxx is a cycling performance enhancer. As you know, the over 60 crew is a heavily vaxxed crew