ALEXA’S DAILY RECOMMENDATIONHealthLife StyleMEDIA WATCHPOLITICSUSWORLD

Judge Allowed Dominion To SUE FOX, OAN, Despite The Identification Of Massive System Vulnerabilities In Dominion Systems That May Have Been Exploited!

This Friday, June 3rd, CISA released the report on Dominion Voting Machines before the weekend news break.

CNN confessed that Dominion Voting Machine Software has flaws, and they may have been exploited previously.

Join The True Defender Telegram Chanel Here: https://t.me/TheTrueDefender

The person who conducted the investigation isn’t Trump’s fan. He shared a report and was covered up by corrupted Obama Judge Amy Totenberg. It’s an example of judicial overreach and corruption in the 2020 Election fraud.

This FRIDAY, CISA shared a report, the response to the problems found in the Halderman report. ‘’J. Alex Halderman, University of Michigan, and Drew Springall, Auburn University, reported these vulnerabilities to CISA.’’

The report shared the problems with the election system that ran the 2020 election in Georgia. This kind of system would be thrown out and replaced in the corporate world before being used. But, in Georgia, we have seen in the past few years how inept and unprincipled these state governments can be.

The actors there, including the Secretary of State and Judge Totenberg, said that the Dominion system remains in place with the material issues included in the Halderman report.

These are the material weaknesses embedding the Dominion system used in Georgia.

NOTE: Mitigations to reduce the risk of exploitation of these vulnerabilities can be found in Section 3 of this document.

2.2.1    IMPROPER VERIFICATION OF CRYPTOGRAPHIC SIGNATURE CWE-347

The tested version of ImageCast X does not validate application signatures to a trusted root certificate. Use of a trusted root certificate ensures software installed on a device is traceable to, or verifiable against, a cryptographic key provided by the manufacturer to detect tampering. An attacker could leverage this vulnerability to install malicious code, which could also be spread to other vulnerable ImageCast X devices via removable media.

CVE-2022-1739 has been assigned to this vulnerability.

2.2.2    MUTABLE ATTESTATION OR MEASUREMENT REPORTING DATA CWE-1283

The tested version of ImageCast X’s on-screen application hash display feature, audit log export, and application export functionality rely on self-attestation mechanisms. An attacker could leverage this vulnerability to disguise malicious applications on a device.

CVE-2022-1740 has been assigned to this vulnerability.

2.2.3    HIDDEN FUNCTIONALITY CWE-912

The tested version of ImageCast X has a Terminal Emulator application which could be leveraged by an attacker to gain elevated privileges on a device and/or install malicious code.

CVE-2022-1741 has been assigned to this vulnerability.

2.2.4    IMPROPER PROTECTION OF ALTERNATE PATH CWE-424

The tested version of ImageCast X allows for rebooting into Android Safe Mode, which allows an attacker to directly access the operating system. An attacker could leverage this vulnerability to escalate privileges on a device and/or install malicious code.

CVE-2022-1742 has been assigned to this vulnerability.

2.2.5    PATH TRAVERSAL: ‘../FILEDIR’ CWE-24

The tested version of ImageCast X can be manipulated to cause arbitrary code execution by specially crafted election definition files. An attacker could leverage this vulnerability to spread malicious code to ImageCast X devices from the EMS.

CVE-2022-1743 has been assigned to this vulnerability.

2.2.6    EXECUTION WITH UNNECESSARY PRIVILEGES CWE-250

Applications on the tested version of ImageCast X can execute code with elevated privileges by exploiting a system level service. An attacker could leverage this vulnerability to escalate privileges on a device and/or install malicious code.

CVE-2022-1744 has been assigned to this vulnerability.

2.2.7    AUTHENTICATION BYPASS BY SPOOFING CWE-290

The authentication mechanism used by technicians on the tested version of ImageCast X is susceptible to forgery. An attacker with physical access may use this to gain administrative privileges on a device and install malicious code or perform arbitrary administrative actions.

CVE-2022-1745 has been assigned to this vulnerability.

2.2.8    INCORRECT PRIVILEGE ASSIGNMENT CWE-266

The authentication mechanism used by poll workers to administer voting using the tested version of ImageCast X can expose cryptographic secrets used to protect election information. An attacker could leverage this vulnerability to gain access to sensitive information and perform privileged actions, potentially affecting other election equipment.

CVE-2022-1746 has been assigned to this vulnerability.

2.2.9    ORIGIN VALIDATION ERROR CWE-346

The authentication mechanism used by voters to activate a voting session on the tested version of ImageCast X is susceptible to forgery. An attacker could leverage this vulnerability to print an arbitrary number of ballots without authorization.

CVE-2022-1747 has been assigned to this vulnerability.

Professor Halderman emphasized that the US elections are at risk of manipulation.

‘’CISA has no evidence that these vulnerabilities have been exploited in any elections.’’

An attack could leverage the software to get elevated privileges and install malicious code.

Later in June, Delaware Judge Eric Davis allowed Dominion to continue with their $1.6 billion lawsuit against Fox News, Newsmax, and OAN.

The Guardian reported:

In June, Dominion Voting Systems, which provided voting machines to 28 states, was given the go-ahead to sue Fox Corp, the parent company of Fox News, in a case that could draw Rupert Murdoch and his son, Lachlan, into the spotlight.

In the $1.6bn lawsuit, Dominion accuses Fox Corp, and the Murdochs specifically, of allowing Fox News to amplify false claims that the voting company had rigged the election for Joe Biden.

Fox Corp had attempted to have the suit dismissed, but a Delaware judge said Dominion had shown adequate evidence for the suit to proceed. Dominion is already suing Fox News, as well as OAN and Newsmax.

“These allegations support a reasonable inference that Rupert and Lachlan Murdoch either knew Dominion had not manipulated the election or at least recklessly disregarded the truth when they allegedly caused Fox News to propagate its claims about Dominion,” Judge Eric Davis said.

Davis’s ruling is not a guarantee that Fox will be found liable. But the judge made it clear that this isn’t some frivolous attempt by Dominion – and media and legal experts think Fox could be in real trouble.

“Dominion has a very strong case against Fox News – and against OAN for that matter,” said Ciara Torres-Spelliscy, a professor who teaches constitutional law at Stetson University and a fellow at the Brennan Center for Justice, a nonpartisan law and policy institute.

“The reason Dominion is suing is because Fox and other rightwing news outlets repeated vicious lies that Dominion’s voting machines stole the 2020 election from Trump for Biden. But all of these conspiracy theories about Dominion’s machines were just pure bunk, and Fox as a news organization should have known that and not given this aspect of the big lie a megaphone.

Source
The Gateway Pundit The Guardian NVD

Addison Wilson

A passionate teacher in English Language and Literature ready to give her best! Developing and implementing diverse curriculums covering a wide range of subjects. With my problem-solving skills, every job will be easily completed, so punctuation is my strength. Highly skilled at motivating students through positive encouragement and reinforcement of concepts via interactive classroom instruction and observation. My working style fits every personality type, so it makes me a great team player. I have completed numerous journalistic projects successfully, so digging for further information is my field. Fighter for freedom of speech! The truth must be revealed!

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Articles

Back to top button

Adblock Detected

For continue reading on the site please disable the Ad-block