![]() The authentication mechanism used by voters to activate a voting session on the tested version of ImageCast X is susceptible to forgery.An attacker could leverage this vulnerability to gain access to sensitive information and perform privileged actions, potentially affecting other election equipment. The authentication mechanism used by poll workers to administer voting using the tested version of ImageCast X can expose cryptographic secrets used to protect election information.An attacker with physical access may use this to gain administrative privileges on a device and install malicious code or perform arbitrary administrative actions. The authentication mechanism used by technicians on the tested version of ImageCast X is susceptible to forgery. ![]() An attacker could leverage this vulnerability to escalate privileges on a device and/or install malicious code.
0 Comments
Leave a Reply. |