It was the head of the Cybersecurity & Infrastructure Security Agency (CISA) during the 2020 election, Christopher Krebs, who made the now widely mocked statement that the 2020 election was "the most secure in U.S.history."
Here is said agency's recently released report that puts the lie to its own ridiculous assertions concerning the 2020 election (and possibly vindicate Sidney Powell, Mike Lindell, et al.):
ICS Advisory (ICSA-22-154-01)
Vulnerabilities Affecting Dominion Voting Systems ImageCast XOriginal release date: June 03, 2022
Legal Notice
All information products included in
https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see
https://us-cert.cisa.gov/tlp/.1. SUMMARY
This advisory identifies vulnerabilities affecting versions of the Dominion Voting Systems Democracy Suite ImageCast X, which is an in-person voting system used to allow voters to mark their ballot. The ImageCast X can be configured to allow a voter to produce a paper record or to record votes electronically. While these vulnerabilities present risks that should be mitigated as soon as possible, CISA has no evidence that these vulnerabilities have been exploited in any elections.
Exploitation of these vulnerabilities would require physical access to individual ImageCast X devices, access to the Election Management System (EMS), or the ability to modify files before they are uploaded to ImageCast X devices. Jurisdictions can prevent and/or detect the exploitation of these vulnerabilities by diligently applying the mitigations recommended in this advisory, including technical, physical, and operational controls that limit unauthorized access or manipulation of voting systems. Many of these mitigations are already typically standard practice in jurisdictions where these devices are in use and can be enhanced to further guard against exploitation of these vulnerabilities.
2. TECHNICAL DETAILS
2.1 AFFECTED PRODUCTS
The following versions of the Dominion Voting Systems ImageCast X software are known to be affected (other versions were not able to be tested):
ImageCast X firmware based on Android 5.1, as used in Dominion Democracy Suite Voting System Version 5.5-A
ImageCast X application Versions 5.5.10.30 and 5.5.10.32, as used in Dominion Democracy Suite Voting System Version 5.5-A
NOTE: After following the vendor’s procedure to upgrade the ImageCast X from Version 5.5.10.30 to 5.5.10.32, or after performing other Android administrative actions,
the ImageCast X may be left in a configuration that could allow an attacker who can attach an external input device to escalate privileges and/or install malicious code. Instructions to check for and mitigate this condition are available from Dominion Voting Systems.
Any jurisdictions running ImageCast X are encouraged to contact Dominion Voting Systems to understand the vulnerability status of their specific implementation.
...
more @
https://www.cisa.gov/uscert/ics/advisor ... -22-154-01