Vulnerabilites related to Dominion Voting Systems - ImageCast X application
CVE-2022-1747 (GCVE-0-2022-1747)
Vulnerability from cvelistv5
Published
2022-06-24 15:00
Modified
2025-04-17 18:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-346 - Origin Validation Error
Summary
The authentication mechanism used by voters to activate a voting session on the tested version of Dominion Voting Systems ImageCast X is susceptible to forgery. An attacker could leverage this vulnerability to print an arbitrary number of ballots without authorization.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Dominion Voting Systems | ImageCast X firmware |
Version: Version 5.5-A |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:16:58.972Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-154-01" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-1747", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-17T17:47:14.829779Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-17T18:47:25.150Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "ImageCast X firmware", "vendor": "Dominion Voting Systems", "versions": [ { "status": "affected", "version": "Version 5.5-A" } ] }, { "product": "ImageCast X application", "vendor": "Dominion Voting Systems", "versions": [ { "status": "affected", "version": "Version 5.5-A Versions 5.5.10.30 and 5.5.10.32" } ] } ], "datePublic": "2022-06-03T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "The authentication mechanism used by voters to activate a voting session on the tested version of Dominion Voting Systems ImageCast X is susceptible to forgery. An attacker could leverage this vulnerability to print an arbitrary number of ballots without authorization." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-346", "description": "CWE-346 Origin Validation Error", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-24T15:00:22.000Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-154-01" } ], "source": { "discovery": "UNKNOWN" }, "x_legacyV4Record": { "CVE_data_meta": { "AKA": "", "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "20220603T06:00:00.000000Z", "ID": "CVE-2022-1747", "STATE": "PUBLIC", "TITLE": "" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ImageCast X firmware", "version": { "version_data": [ { "platform": "", "version_affected": "=", "version_name": "", "version_value": "Version 5.5-A" } ] } } ] }, "vendor_name": "Dominion Voting Systems" }, { "product": { "product_data": [ { "product_name": "ImageCast X application", "version": { "version_data": [ { "platform": "", "version_affected": "=", "version_name": "Version 5.5-A", "version_value": "Versions 5.5.10.30 and 5.5.10.32" } ] } } ] }, "vendor_name": "Dominion Voting Systems" } ] } }, "credit": [], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The authentication mechanism used by voters to activate a voting session on the tested version of Dominion Voting Systems ImageCast X is susceptible to forgery. An attacker could leverage this vulnerability to print an arbitrary number of ballots without authorization." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-346 Origin Validation Error" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-154-01", "refsource": "MISC", "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-154-01" } ] }, "solution": [], "source": { "advisory": "", "defect": [], "discovery": "UNKNOWN" }, "work_around": [] } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2022-1747", "datePublished": "2022-06-24T15:00:22.908Z", "dateReserved": "2022-05-16T00:00:00.000Z", "dateUpdated": "2025-04-17T18:47:25.150Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-1739 (GCVE-0-2022-1739)
Vulnerability from cvelistv5
Published
2022-06-24 15:00
Modified
2025-04-17 18:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-347 - Improper Verification of Cryptographic Signature
Summary
The tested version of Dominion Voting Systems ImageCast X does not validate application signatures to a trusted root certificate. Use of a trusted root certificate ensures software installed on a device is traceable to, or verifiable against, a cryptographic key provided by the manufacturer to detect tampering. An attacker could leverage this vulnerability to install malicious code, which could also be spread to other vulnerable ImageCast X devices via removable media.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Dominion Voting Systems | ImageCast X firmware |
Version: Version 5.5-A |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:16:58.894Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-154-01" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-1739", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-17T17:48:04.295799Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-17T18:47:32.163Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "ImageCast X firmware", "vendor": "Dominion Voting Systems", "versions": [ { "status": "affected", "version": "Version 5.5-A" } ] }, { "product": "ImageCast X application", "vendor": "Dominion Voting Systems", "versions": [ { "status": "affected", "version": "Versions 5.5.10.30 and 5.5.10.32" } ] } ], "datePublic": "2022-06-03T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "The tested version of Dominion Voting Systems ImageCast X does not validate application signatures to a trusted root certificate. Use of a trusted root certificate ensures software installed on a device is traceable to, or verifiable against, a cryptographic key provided by the manufacturer to detect tampering. An attacker could leverage this vulnerability to install malicious code, which could also be spread to other vulnerable ImageCast X devices via removable media." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-347", "description": "CWE-347 Improper Verification of Cryptographic Signature", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-24T15:00:22.000Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-154-01" } ], "source": { "discovery": "UNKNOWN" }, "title": "2.2.1\tIMPROPER VERIFICATION OF CRYPTOGRAPHIC SIGNATURE CWE-347", "x_legacyV4Record": { "CVE_data_meta": { "AKA": "", "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "20220603T06:00:00.000000Z", "ID": "CVE-2022-1739", "STATE": "PUBLIC", "TITLE": "2.2.1\tIMPROPER VERIFICATION OF CRYPTOGRAPHIC SIGNATURE CWE-347" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ImageCast X firmware", "version": { "version_data": [ { "platform": "", "version_affected": "=", "version_name": "", "version_value": "Version 5.5-A" } ] } } ] }, "vendor_name": "Dominion Voting Systems" }, { "product": { "product_data": [ { "product_name": "ImageCast X application", "version": { "version_data": [ { "platform": "", "version_affected": "=", "version_name": "", "version_value": "Versions 5.5.10.30 and 5.5.10.32" } ] } } ] }, "vendor_name": "Dominion Voting Systems" } ] } }, "credit": [], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The tested version of Dominion Voting Systems ImageCast X does not validate application signatures to a trusted root certificate. Use of a trusted root certificate ensures software installed on a device is traceable to, or verifiable against, a cryptographic key provided by the manufacturer to detect tampering. An attacker could leverage this vulnerability to install malicious code, which could also be spread to other vulnerable ImageCast X devices via removable media." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-347 Improper Verification of Cryptographic Signature" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-154-01", "refsource": "MISC", "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-154-01" } ] }, "solution": [], "source": { "advisory": "", "defect": [], "discovery": "UNKNOWN" }, "work_around": [] } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2022-1739", "datePublished": "2022-06-24T15:00:22.129Z", "dateReserved": "2022-05-16T00:00:00.000Z", "dateUpdated": "2025-04-17T18:47:32.163Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-1740 (GCVE-0-2022-1740)
Vulnerability from cvelistv5
Published
2022-06-24 15:00
Modified
2025-04-17 18:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
The tested version of Dominion Voting Systems ImageCast X’s on-screen application hash display feature, audit log export, and application export functionality rely on self-attestation mechanisms. An attacker could leverage this vulnerability to disguise malicious applications on a device.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Dominion Voting Systems | ImageCast X application |
Version: Version 5.5-A Versions 5.5.10.30 and 5.5.10.32 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:16:58.942Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-154-01" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-1740", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-17T15:53:38.017649Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1283", "description": "CWE-1283 Mutable Attestation or Measurement Reporting Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-17T18:46:49.242Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "ImageCast X application", "vendor": "Dominion Voting Systems", "versions": [ { "status": "affected", "version": "Version 5.5-A Versions 5.5.10.30 and 5.5.10.32" } ] }, { "product": "ImageCast X firmware", "vendor": "Dominion Voting Systems", "versions": [ { "status": "affected", "version": "Version 5.5-A" } ] } ], "datePublic": "2022-06-03T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "The tested version of Dominion Voting Systems ImageCast X\u2019s on-screen application hash display feature, audit log export, and application export functionality rely on self-attestation mechanisms. An attacker could leverage this vulnerability to disguise malicious applications on a device." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1283", "description": "CWE-1283", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-24T15:00:26.000Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-154-01" } ], "source": { "discovery": "UNKNOWN" }, "title": "2.2.2 MUTABLE ATTESTATION OR MEASUREMENT REPORTING DATA CWE-1283", "x_legacyV4Record": { "CVE_data_meta": { "AKA": "", "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "20220603T06:00:00.000000Z", "ID": "CVE-2022-1740", "STATE": "PUBLIC", "TITLE": "2.2.2 MUTABLE ATTESTATION OR MEASUREMENT REPORTING DATA CWE-1283" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ImageCast X application", "version": { "version_data": [ { "platform": "", "version_affected": "=", "version_name": "Version 5.5-A", "version_value": "Versions 5.5.10.30 and 5.5.10.32" } ] } } ] }, "vendor_name": "Dominion Voting Systems" }, { "product": { "product_data": [ { "product_name": "ImageCast X firmware", "version": { "version_data": [ { "platform": "", "version_affected": "=", "version_name": "", "version_value": "Version 5.5-A" } ] } } ] }, "vendor_name": "Dominion Voting Systems" } ] } }, "credit": [], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The tested version of Dominion Voting Systems ImageCast X\u2019s on-screen application hash display feature, audit log export, and application export functionality rely on self-attestation mechanisms. An attacker could leverage this vulnerability to disguise malicious applications on a device." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-1283" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-154-01", "refsource": "MISC", "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-154-01" } ] }, "solution": [], "source": { "advisory": "", "defect": [], "discovery": "UNKNOWN" }, "work_around": [] } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2022-1740", "datePublished": "2022-06-24T15:00:27.003Z", "dateReserved": "2022-05-16T00:00:00.000Z", "dateUpdated": "2025-04-17T18:46:49.242Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-1742 (GCVE-0-2022-1742)
Vulnerability from cvelistv5
Published
2022-06-24 15:00
Modified
2025-04-17 18:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
The tested version of Dominion Voting Systems ImageCast X allows for rebooting into Android Safe Mode, which allows an attacker to directly access the operating system. An attacker could leverage this vulnerability to escalate privileges on a device and/or install malicious code.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Dominion Voting Systems | ImageCast X application |
Version: Version 5.5-A Versions 5.5.10.30 and 5.5.10.32 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:16:59.804Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-154-01" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-1742", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-17T15:55:17.809851Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-17T18:46:56.195Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "ImageCast X application", "vendor": "Dominion Voting Systems", "versions": [ { "status": "affected", "version": "Version 5.5-A Versions 5.5.10.30 and 5.5.10.32" } ] }, { "product": "ImageCast X firmware", "vendor": "Dominion Voting Systems", "versions": [ { "status": "affected", "version": "Version 5.5-A" } ] } ], "datePublic": "2022-06-03T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "The tested version of Dominion Voting Systems ImageCast X allows for rebooting into Android Safe Mode, which allows an attacker to directly access the operating system. An attacker could leverage this vulnerability to escalate privileges on a device and/or install malicious code." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-424", "description": "CWE-424", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-24T15:00:26.000Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-154-01" } ], "source": { "discovery": "UNKNOWN" }, "title": "2.2.4 IMPROPER PROTECTION OF ALTERNATE PATH CWE-424", "x_legacyV4Record": { "CVE_data_meta": { "AKA": "", "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "20220603T06:00:00.000000Z", "ID": "CVE-2022-1742", "STATE": "PUBLIC", "TITLE": "2.2.4 IMPROPER PROTECTION OF ALTERNATE PATH CWE-424" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ImageCast X application", "version": { "version_data": [ { "platform": "", "version_affected": "None", "version_name": "Version 5.5-A", "version_value": "Versions 5.5.10.30 and 5.5.10.32" } ] } } ] }, "vendor_name": "Dominion Voting Systems" }, { "product": { "product_data": [ { "product_name": "ImageCast X firmware", "version": { "version_data": [ { "platform": "", "version_affected": "None", "version_name": "", "version_value": "Version 5.5-A" } ] } } ] }, "vendor_name": "Dominion Voting Systems" } ] } }, "credit": [], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The tested version of Dominion Voting Systems ImageCast X allows for rebooting into Android Safe Mode, which allows an attacker to directly access the operating system. An attacker could leverage this vulnerability to escalate privileges on a device and/or install malicious code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-424" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-154-01", "refsource": "MISC", "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-154-01" } ] }, "solution": [], "source": { "advisory": "", "defect": [], "discovery": "UNKNOWN" }, "work_around": [] } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2022-1742", "datePublished": "2022-06-24T15:00:26.248Z", "dateReserved": "2022-05-16T00:00:00.000Z", "dateUpdated": "2025-04-17T18:46:56.195Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-1745 (GCVE-0-2022-1745)
Vulnerability from cvelistv5
Published
2022-06-24 15:00
Modified
2025-04-17 18:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-290 - Authentication Bypass by Spoofing
Summary
The authentication mechanism used by technicians on the tested version of Dominion Voting Systems ImageCast X is susceptible to forgery. An attacker with physical access may use this to gain administrative privileges on a device and install malicious code or perform arbitrary administrative actions.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Dominion Voting Systems | ImageCast X application |
Version: Version 5.5-A Versions 5.5.10.30 and 5.5.10.32 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:16:59.678Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-154-01" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-1745", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-17T15:52:29.183640Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-17T18:46:41.583Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "ImageCast X application", "vendor": "Dominion Voting Systems", "versions": [ { "status": "affected", "version": "Version 5.5-A Versions 5.5.10.30 and 5.5.10.32" } ] }, { "product": "ImageCast X firmware", "vendor": "Dominion Voting Systems", "versions": [ { "status": "affected", "version": "Version 5.5-A" } ] } ], "datePublic": "2022-06-03T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "The authentication mechanism used by technicians on the tested version of Dominion Voting Systems ImageCast X is susceptible to forgery. An attacker with physical access may use this to gain administrative privileges on a device and install malicious code or perform arbitrary administrative actions." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-290", "description": "CWE-290 Authentication Bypass by Spoofing", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-24T15:00:27.000Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-154-01" } ], "source": { "discovery": "UNKNOWN" }, "title": "2.2.7 AUTHENTICATION BYPASS BY SPOOFING CWE-290", "x_legacyV4Record": { "CVE_data_meta": { "AKA": "", "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "20220603T06:00:00.000000Z", "ID": "CVE-2022-1745", "STATE": "PUBLIC", "TITLE": "2.2.7 AUTHENTICATION BYPASS BY SPOOFING CWE-290" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ImageCast X application", "version": { "version_data": [ { "platform": "", "version_affected": "=", "version_name": "Version 5.5-A", "version_value": "Versions 5.5.10.30 and 5.5.10.32" } ] } } ] }, "vendor_name": "Dominion Voting Systems" }, { "product": { "product_data": [ { "product_name": "ImageCast X firmware", "version": { "version_data": [ { "platform": "", "version_affected": "=", "version_name": "", "version_value": "Version 5.5-A" } ] } } ] }, "vendor_name": "Dominion Voting Systems" } ] } }, "credit": [], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The authentication mechanism used by technicians on the tested version of Dominion Voting Systems ImageCast X is susceptible to forgery. An attacker with physical access may use this to gain administrative privileges on a device and install malicious code or perform arbitrary administrative actions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-290 Authentication Bypass by Spoofing" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-154-01", "refsource": "MISC", "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-154-01" } ] }, "solution": [], "source": { "advisory": "", "defect": [], "discovery": "UNKNOWN" }, "work_around": [] } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2022-1745", "datePublished": "2022-06-24T15:00:27.944Z", "dateReserved": "2022-05-16T00:00:00.000Z", "dateUpdated": "2025-04-17T18:46:41.583Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-1746 (GCVE-0-2022-1746)
Vulnerability from cvelistv5
Published
2022-06-24 15:00
Modified
2025-04-17 18:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
The authentication mechanism used by poll workers to administer voting using the tested version of Dominion Voting Systems ImageCast X can expose cryptographic secrets used to protect election information. An attacker could leverage this vulnerability to gain access to sensitive information and perform privileged actions, potentially affecting other election equipment.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Dominion Voting Systems | ImageCast X application |
Version: Version 5.5-A Versions 5.5.10.30 and 5.5.10.32 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:16:59.794Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-154-01" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-1746", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-17T17:48:40.094895Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-17T18:47:40.296Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "ImageCast X application", "vendor": "Dominion Voting Systems", "versions": [ { "status": "affected", "version": "Version 5.5-A Versions 5.5.10.30 and 5.5.10.32" } ] }, { "product": "ImageCast X firmware", "vendor": "Dominion Voting Systems", "versions": [ { "status": "affected", "version": "Version 5.5-A" } ] } ], "datePublic": "2022-06-03T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "The authentication mechanism used by poll workers to administer voting using the tested version of Dominion Voting Systems ImageCast X can expose cryptographic secrets used to protect election information. An attacker could leverage this vulnerability to gain access to sensitive information and perform privileged actions, potentially affecting other election equipment." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-266", "description": "CWE-266", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-24T15:00:21.000Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-154-01" } ], "source": { "discovery": "UNKNOWN" }, "title": "2.2.8 INCORRECT PRIVILEGE ASSIGNMENT CWE-266", "x_legacyV4Record": { "CVE_data_meta": { "AKA": "", "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "20220603T06:00:00.000000Z", "ID": "CVE-2022-1746", "STATE": "PUBLIC", "TITLE": "2.2.8 INCORRECT PRIVILEGE ASSIGNMENT CWE-266" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ImageCast X application", "version": { "version_data": [ { "platform": "", "version_affected": "=", "version_name": "Version 5.5-A", "version_value": "Versions 5.5.10.30 and 5.5.10.32" } ] } } ] }, "vendor_name": "Dominion Voting Systems" }, { "product": { "product_data": [ { "product_name": "ImageCast X firmware", "version": { "version_data": [ { "platform": "", "version_affected": "=", "version_name": "", "version_value": "Version 5.5-A" } ] } } ] }, "vendor_name": "Dominion Voting Systems" } ] } }, "credit": [], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The authentication mechanism used by poll workers to administer voting using the tested version of Dominion Voting Systems ImageCast X can expose cryptographic secrets used to protect election information. An attacker could leverage this vulnerability to gain access to sensitive information and perform privileged actions, potentially affecting other election equipment." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-266" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-154-01", "refsource": "MISC", "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-154-01" } ] }, "solution": [], "source": { "advisory": "", "defect": [], "discovery": "UNKNOWN" }, "work_around": [] } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2022-1746", "datePublished": "2022-06-24T15:00:21.325Z", "dateReserved": "2022-05-16T00:00:00.000Z", "dateUpdated": "2025-04-17T18:47:40.296Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-1741 (GCVE-0-2022-1741)
Vulnerability from cvelistv5
Published
2022-06-24 15:00
Modified
2025-04-17 18:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-912 - cwe-912
Summary
The tested version of Dominion Voting Systems ImageCast X has a Terminal Emulator application which could be leveraged by an attacker to gain elevated privileges on a device and/or install malicious code.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Dominion Voting Systems | ImageCast X application |
Version: Version 5.5-A Versions 5.5.10.30 and 5.5.10.32 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:16:59.822Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-154-01" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-1741", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-17T15:57:42.089356Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-17T18:47:11.112Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "ImageCast X application", "vendor": "Dominion Voting Systems", "versions": [ { "status": "affected", "version": "Version 5.5-A Versions 5.5.10.30 and 5.5.10.32" } ] }, { "product": "ImageCast X firmware", "vendor": "Dominion Voting Systems", "versions": [ { "status": "affected", "version": "Version 5.5-A" } ] } ], "datePublic": "2022-06-03T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "The tested version of Dominion Voting Systems ImageCast X has a Terminal Emulator application which could be leveraged by an attacker to gain elevated privileges on a device and/or install malicious code." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-912", "description": "cwe-912", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-24T15:00:24.000Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-154-01" } ], "source": { "discovery": "UNKNOWN" }, "title": "2.2.3 HIDDEN FUNCTIONALITY CWE-912", "x_legacyV4Record": { "CVE_data_meta": { "AKA": "", "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "20220603T06:00:00.000000Z", "ID": "CVE-2022-1741", "STATE": "PUBLIC", "TITLE": "2.2.3 HIDDEN FUNCTIONALITY CWE-912" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ImageCast X application", "version": { "version_data": [ { "platform": "", "version_affected": "=", "version_name": "Version 5.5-A", "version_value": "Versions 5.5.10.30 and 5.5.10.32" } ] } } ] }, "vendor_name": "Dominion Voting Systems" }, { "product": { "product_data": [ { "product_name": "ImageCast X firmware", "version": { "version_data": [ { "platform": "", "version_affected": "=", "version_name": "", "version_value": "Version 5.5-A" } ] } } ] }, "vendor_name": "Dominion Voting Systems" } ] } }, "credit": [], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The tested version of Dominion Voting Systems ImageCast X has a Terminal Emulator application which could be leveraged by an attacker to gain elevated privileges on a device and/or install malicious code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "cwe-912" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-154-01", "refsource": "MISC", "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-154-01" } ] }, "solution": [], "source": { "advisory": "", "defect": [], "discovery": "UNKNOWN" }, "work_around": [] } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2022-1741", "datePublished": "2022-06-24T15:00:24.654Z", "dateReserved": "2022-05-16T00:00:00.000Z", "dateUpdated": "2025-04-17T18:47:11.112Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }