CVE-2022-1746

7.6 HIGH

📋 TL;DR

The authentication mechanism in Dominion Voting Systems ImageCast X voting machines exposes cryptographic secrets used to protect election data. Attackers could leverage this to access sensitive information and perform privileged actions on election equipment. This affects poll workers administering voting with vulnerable ImageCast X devices.

💻 Affected Systems

Products:
  • Dominion Voting Systems ImageCast X
Versions: Tested version (specific version not disclosed in public advisory)
Operating Systems: Embedded/Proprietary OS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the authentication mechanism used by poll workers during voting administration. Requires physical or network access to voting equipment.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains full control over voting machines, manipulates election results, compromises election integrity, and accesses sensitive voter data.

🟠

Likely Case

Unauthorized access to cryptographic secrets leading to data exfiltration, privilege escalation, and potential manipulation of specific voting machine functions.

🟢

If Mitigated

Limited impact with proper physical security controls, network segmentation, and monitoring preventing exploitation attempts.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires access to the voting machine interface during poll worker authentication. No public exploit code available as of advisory publication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in public advisory

Vendor Advisory: https://www.cisa.gov/uscert/ics/advisories/icsa-22-154-01

Restart Required: Yes

Instructions:

1. Contact Dominion Voting Systems for security updates. 2. Apply vendor-provided patches. 3. Restart affected devices. 4. Verify patch installation.

🔧 Temporary Workarounds

Enhanced Physical Security Controls

all

Implement strict physical access controls to voting equipment, including tamper-evident seals, surveillance, and chain-of-custody procedures.

Network Segmentation

all

Isolate voting machines on separate network segments with no internet connectivity and minimal internal network access.

🧯 If You Can't Patch

  • Implement 24/7 physical monitoring and tamper detection for all voting equipment
  • Disconnect voting machines from all networks and use air-gapped configurations

🔍 How to Verify

Check if Vulnerable:

Check device version against vendor advisory and verify if authentication mechanism exposes cryptographic secrets during poll worker administration.

Check Version:

Contact Dominion Voting Systems for version verification procedures as commands are proprietary.

Verify Fix Applied:

Verify with vendor that patches have been applied and test authentication mechanism to confirm cryptographic secrets are no longer exposed.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized authentication attempts
  • Unexpected cryptographic operations
  • Access to authentication mechanisms outside normal poll hours

Network Indicators:

  • Unexpected network traffic to/from voting machines
  • Attempts to access authentication interfaces

SIEM Query:

Authentication events from voting machine IP addresses outside expected time windows OR multiple failed authentication attempts

🔗 References

📤 Share & Export