Количество 3
Количество 3
CVE-2022-1739
The tested version of Dominion Voting Systems ImageCast X does not validate application signatures to a trusted root certificate. Use of a trusted root certificate ensures software installed on a device is traceable to, or verifiable against, a cryptographic key provided by the manufacturer to detect tampering. An attacker could leverage this vulnerability to install malicious code, which could also be spread to other vulnerable ImageCast X devices via removable media.
GHSA-9j74-vwr9-qf7f
The tested version of Dominion Voting Systems ImageCast X does not validate application signatures to a trusted root certificate. Use of a trusted root certificate ensures software installed on a device is traceable to, or verifiable against, a cryptographic key provided by the manufacturer to detect tampering. An attacker could leverage this vulnerability to install malicious code, which could also be spread to other vulnerable ImageCast X devices via removable media.
BDU:2022-04702
Уязвимость эмулятора терминала программного обеспечения устройства для маркировки бюллетеней ImageCast X, связанная с некорректной проверкой криптографической подписи, позволяющая нарушителю выполнить произвольный код
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2022-1739 The tested version of Dominion Voting Systems ImageCast X does not validate application signatures to a trusted root certificate. Use of a trusted root certificate ensures software installed on a device is traceable to, or verifiable against, a cryptographic key provided by the manufacturer to detect tampering. An attacker could leverage this vulnerability to install malicious code, which could also be spread to other vulnerable ImageCast X devices via removable media. | CVSS3: 6.8 | 0% Низкий | больше 3 лет назад | |
GHSA-9j74-vwr9-qf7f The tested version of Dominion Voting Systems ImageCast X does not validate application signatures to a trusted root certificate. Use of a trusted root certificate ensures software installed on a device is traceable to, or verifiable against, a cryptographic key provided by the manufacturer to detect tampering. An attacker could leverage this vulnerability to install malicious code, which could also be spread to other vulnerable ImageCast X devices via removable media. | CVSS3: 7.6 | 0% Низкий | больше 3 лет назад | |
BDU:2022-04702 Уязвимость эмулятора терминала программного обеспечения устройства для маркировки бюллетеней ImageCast X, связанная с некорректной проверкой криптографической подписи, позволяющая нарушителю выполнить произвольный код | CVSS3: 7.6 | 0% Низкий | больше 3 лет назад |
Уязвимостей на страницу