CVE-2022-1739

The tested version of Dominion Voting Systems ImageCast X does not validate application signatures to a trusted root certificate. Use of a trusted root certificate ensures software installed on a devi ...

Continue Reading
CVE-2022-1740

The tested version of Dominion Voting Systems ImageCast X’s on-screen application hash display feature, audit log export, and application export functionality rely on self-attestation mechanisms. An ...

Continue Reading
CVE-2022-1741

The tested version of Dominion Voting Systems ImageCast X has a Terminal Emulator application which could be leveraged by an attacker to gain elevated privileges on a device and/or install malicious c ...

Continue Reading
CVE-2022-1742

The tested version of Dominion Voting Systems ImageCast X allows for rebooting into Android Safe Mode, which allows an attacker to directly access the operating system. An attacker could leverage this ...

Continue Reading
CVE-2022-1746

The authentication mechanism used by poll workers to administer voting using the tested version of Dominion Voting Systems ImageCast X can expose cryptographic secrets used to protect election informa ...

Continue Reading
CVE-2022-1668

Weak default root user credentials allow remote attackers to easily obtain OS superuser privileges over the open TCP port for SSH.Read More ...

Continue Reading
CVE-2022-1666

The default password for the web application’s root user (the vendor’s private account) was weak and the MD5 hash was used to crack the password using a widely available open-source tool.Read More ...

Continue Reading
CVE-2022-1524

LRM version 2.4 and lower does not implement TLS encryption. A malicious actor can MITM attack sensitive data in-transit, including credentials.Read More ...

Continue Reading

Back to Main

Subscribe for the latest news: