Some “vulnerabilities” in Dominion ballot-counting software were uncovered during a Georgia investigation into election fraud claims stemming from the 2020 election, but the US government says there is no reason to believe the vulnerabilities have ever been utilized in election fraud attempts.
Government cybersecurity officials identified what could be possible vulnerabilities in the Dominion Voting System software as they combed the software for any signs of election fraud during the 2020 presidential election. However, the experts say, there is no evidence that the vulnerabilities they identified have ever been used to perpetrate election fraud.
“While these vulnerabilities present risks that should be promptly mitigated, CISA has no evidence that these vulnerabilities have been exploited in any elections,” says a draft advisory from the US Cybersecurity and Infrastructure Security Agency (CISA).
“We are working closely with election officials to help them address these vulnerabilities and ensure the continued security and resilience of US election infrastructure,” CISA Executive Director Brandon Wales told CNN.
“We have no evidence that these vulnerabilities have been exploited and no evidence that they have affected any election results,” said Wales. “Of note, states’ standard election security procedures would detect exploitation of these vulnerabilities and in many cases would prevent attempts entirely. This makes it very unlikely that these vulnerabilities could affect an election.”
The CISA advisory points to nine specific flaws in the Dominion Voting System software, called the Dominion Voting Systems Democracy Suite ImageCast X.
Dominion Voting Systems has been under fire since the 2020 election due to claims of vote tampering and election fraud that believers say put President Joe Biden in the White House illegitimately.
"*" indicates required fields
Use Promo Code TFN for discounts!