The parse function in MSA vot.Ar 3.1 does not check whether a candidate receives more than one vote, which allows physically proximate attackers to cast multiple votes for a candidate via a crafted RFID ballot tag.
References
Link | Resource |
---|---|
https://docs.google.com/document/d/13t1jqu-Upj4SyjYBMj3OMshdy6rGBrnb1R3P-goz-cs/edit?pli=1 | Issue Tracking Third Party Advisory |
https://docs.google.com/document/d/1aH6kvoLR8O1qWOpEz89FAB2xFcBNB-QqHgZpXxg0vGE/preview?sle=true&pli=1 | Issue Tracking Third Party Advisory |
https://www.eleccionesciudad.gob.ar/uploads/resoluciones/Informe_05-BALOTAJE-2015-07-17.pdf | Issue Tracking Third Party Advisory |
https://www.youtube.com/watch?v=CTOCspLn6Zk | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2017-10-23 18:29
Updated : 2024-02-04 19:29
NVD link : CVE-2015-6839
Mitre link : CVE-2015-6839
CVE.ORG link : CVE-2015-6839
JSON object : View
Products Affected
grupo_msa
- vot.ar
CWE
CWE-20
Improper Input Validation