Incident: Outdated Windows 7 Software Vulnerability in Election Systems.

Published Date: 2019-07-13

Postmortem Analysis
Timeline 1. The software failure incident happened around January 14, when Windows 7 reached its "end of life" (Article 86946).
System 1. Windows 7 operating system [86946]
Responsible Organization 1. Vendors in the election technology industry, such as Election Systems and Software LLC, Dominion Voting Systems Inc., and Hart InterCivic Inc., who provided election systems running on outdated software like Windows 7 [86946].
Impacted Organization 1. Election jurisdictions nationwide, including Pennsylvania, Wisconsin, Florida, Iowa, Indiana, Arizona, North Carolina, Michigan, and Georgia [86946]
Software Causes 1. The software cause of the failure incident was the continued use of Windows 7 or older operating systems in election systems, which reached their "end of life" and stopped receiving technical support and security patches from Microsoft [86946].
Non-software Causes 1. Lack of federal requirements or oversight in determining the security level of election systems [86946] 2. Uncertainty regarding who would pay for the expense of security updates for outdated software [86946] 3. Insufficient resources and funding for election administrators to keep systems up-to-date [86946]
Impacts 1. The software failure incident involving the use of outdated Windows 7 operating systems in election systems has left many election jurisdictions vulnerable to hackers due to the lack of technical support and security patches [86946]. 2. The situation highlights the risks associated with private companies determining the security level of election systems without federal requirements or oversight, potentially compromising the integrity of elections [86946]. 3. The impending end of Windows 7 support has raised concerns about the security of election systems in battleground states such as Pennsylvania, Wisconsin, Florida, Iowa, Indiana, Arizona, and North Carolina, as well as Michigan and Georgia [86946]. 4. The software failure incident has prompted criticism from election security experts like J. Alex Halderman, who warned about the consequences of not keeping voting machine software up-to-date and the lack of provisions for doing so [86946]. 5. The software failure incident has highlighted the challenges faced by election administrators in updating systems, with the certification process for new software versions being lengthy, costly, and potentially not completed before the upcoming primaries [86946].
Preventions 1. Implementing a proactive software update policy to ensure that election systems are running on supported and up-to-date operating systems [86946]. 2. Enforcing federal requirements or oversight to ensure that election systems meet cybersecurity standards and are regularly updated [86946]. 3. Conducting thorough cybersecurity checks during the certification process for election systems to identify and address vulnerabilities [86946]. 4. Providing adequate resources and funding to election jurisdictions to support the timely upgrade of election systems to more secure operating systems [86946].
Fixes 1. Upgrading election systems to run on Windows 10, which has more security features, could fix the software failure incident [86946]. 2. Implementing federal requirements or oversight to ensure the security level of election systems is maintained could help prevent such incidents in the future [86946]. 3. Providing financial support for jurisdictions to update their systems and keep the software up-to-date could address the issue of outdated software vulnerabilities [86946].
References 1. Election Systems and Software LLC 2. Dominion Voting Systems Inc. 3. Hart InterCivic Inc. 4. Microsoft 5. U.S. Election Assistance Commission 6. Various state officials and spokespersons 7. J. Alex Halderman, University of Michigan professor 8. Marilyn Marks, Coalition for Good Governance executive director 9. Susan Greenhalgh, National Election Defense Coalition policy director 10. Kevin Skoglund, Citizens for Better Elections chief technologist 11. Sen. Ron Wyden, D-Ore. [86946]

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization (a) The software failure incident having happened again at one_organization: - Dominion Voting Systems Inc. is mentioned in the article as one of the three major companies dominating the election technology industry [86946]. It is noted that Dominion's newer systems are not affected by the upcoming Windows software issues, but the company has election systems acquired from no-longer-existing companies that may run on even older operating systems. This situation could be seen as a potential software failure incident within the organization if those older systems face vulnerabilities or issues similar to the ones highlighted in the article. (b) The software failure incident having happened again at multiple_organization: - The article mentions that the vast majority of election jurisdictions nationwide, including battleground states like Pennsylvania, Wisconsin, Florida, Iowa, Indiana, Arizona, and North Carolina, use Windows 7 or older operating systems for election processes [86946]. This indicates that the issue of running on outdated software and facing vulnerabilities is not limited to a single organization but is a widespread concern across multiple election jurisdictions and states.
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase is evident in the article. The article highlights a significant issue where many election jurisdictions nationwide, including Pennsylvania, are using Windows 7 or older operating systems to create ballots, program voting machines, tally votes, and report counts. With Windows 7 reaching its "end of life" and Microsoft ceasing to provide technical support and patches after January 14, 2020, the systems running on this outdated software become more vulnerable to hackers [86946]. (b) The software failure incident related to the operation phase is also apparent in the article. It mentions that election systems running on Windows 7 face a security risk as Microsoft stops providing support and patches for this operating system. The article discusses the challenges faced by election administrators in upgrading their systems to Windows 10, which has more security features, before the primaries begin in February. This operational issue poses a vulnerability to potential cyberattacks due to the lack of support for the outdated software [86946].
Boundary (Internal/External) within_system, outside_system (a) The software failure incident related to the end of Windows 7 support for election systems can be categorized as within_system. This is because the issue arises from the fact that many election jurisdictions nationwide use Windows 7 or older operating systems to create ballots, program voting machines, tally votes, and report counts. With Windows 7 reaching its "end of life," Microsoft will stop providing technical support and producing patches to fix software vulnerabilities, leaving these systems more vulnerable to hackers [86946].
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident occurring due to non-human actions: The software failure incident in the articles is primarily related to the end of support for Windows 7 by Microsoft. This non-human action of Microsoft ending support for Windows 7 is a significant contributing factor to the vulnerability of election systems running on this outdated operating system [86946]. (b) The software failure incident occurring due to human actions: Human actions also play a role in this software failure incident. The decision by election jurisdictions to continue using Windows 7 or older operating systems despite the known risks and the lack of federal requirements or oversight in ensuring the security of election systems are examples of human actions contributing to the vulnerability of the systems [86946].
Dimension (Hardware/Software) hardware, software (a) The software failure incident occurring due to hardware: - The article discusses the issue of election systems running on old software like Windows 7, which will soon be outdated and more vulnerable to hackers due to the end of support from Microsoft [86946]. - It mentions that some election systems are using older operating systems that will reach their end of life, making them susceptible to cyberattacks [86946]. - The article highlights the concern that election systems are not supposed to be connected to the internet, but various stages of the election process require transfers of information, which could be points of vulnerability for attackers [86946]. (b) The software failure incident occurring due to software: - The main focus of the article is on the software aspect of the failure, particularly the reliance on outdated operating systems like Windows 7 in election systems [86946]. - It discusses the lack of federal requirements or oversight in ensuring the security of election systems, leaving it up to private companies to determine the security level of the systems [86946]. - The article also mentions the challenges faced by election administrators in updating their systems to newer, more secure software versions like Windows 10, which is a software-related issue [86946].
Objective (Malicious/Non-malicious) non-malicious (a) The software failure incident mentioned in the articles is non-malicious. The failure is primarily due to the use of outdated software, specifically Windows 7, in election systems across various states. The end of support for Windows 7 by Microsoft is a critical factor contributing to the vulnerability of these systems to potential cyberattacks [86946].
Intent (Poor/Accidental Decisions) poor_decisions, accidental_decisions (a) The software failure incident related to the end of support for Windows 7 in election systems can be attributed to poor decisions made by election jurisdictions and vendors. The incident highlights how many election jurisdictions nationwide, including battleground states like Pennsylvania, Wisconsin, Florida, and others, are still using Windows 7 or older operating systems for critical election processes despite the impending end of support for Windows 7 [86946]. This situation reflects a lack of proactive decision-making to ensure the security and integrity of election systems, as highlighted by experts like J. Alex Halderman, who warned about the risks of not keeping software up-to-date [86946]. Additionally, the article mentions that the election technology industry is dominated by a few major vendors who have been slow to address the issue, with only one of the major vendors having newer systems unaffected by the upcoming Windows software issues [86946]. (b) The software failure incident can also be seen as a result of accidental decisions or unintended consequences. The article mentions that the situation with Windows 7 reaching its end of life for election systems was not anticipated by many election jurisdictions and vendors, leading to a scenario where critical election processes could be left vulnerable to hackers due to the lack of support and patches for the outdated software [86946]. The article highlights that election administrators are now facing the challenge of trying to upgrade their systems while preparing for upcoming primaries, indicating that the consequences of relying on outdated software were not fully foreseen [86946]. Additionally, the article points out that the certification process for election systems, which is meant to ensure proper functioning on tested operating systems, may not adequately address cybersecurity concerns or keep pace with evolving technology, leading to unintended vulnerabilities in the systems [86946].
Capability (Incompetence/Accidental) development_incompetence (a) The software failure incident related to development incompetence can be seen in the article where it is highlighted that many election jurisdictions nationwide, including Pennsylvania, are still using Windows 7 or older operating systems for their election systems. This is a concern because Windows 7 reached its "end of life" on Jan. 14, 2020, meaning Microsoft stopped providing technical support and producing patches to fix software vulnerabilities. The article mentions that the election technology industry is dominated by three major companies, and only one of them, Dominion Voting Systems Inc., has newer systems that are not affected by the upcoming Windows software issues. ES&S, the largest vendor, completed its latest certification using Windows 7, and Hart's last certification was on a Windows version that won't be supported by November 2020. This situation raises concerns about the lack of professional competence in ensuring that election systems are up-to-date and secure [86946]. (b) The software failure incident related to accidental factors can be inferred from the article where it mentions that the use of election systems running on outdated software like Windows 7 poses a significant security risk. The article highlights that the end of support for Windows 7 means that hackers could exploit vulnerabilities in these systems, as Microsoft will no longer provide security updates. This situation was not intentional but rather a consequence of jurisdictions and vendors not keeping the software up-to-date. The article also mentions that election administrators are facing challenges in upgrading their systems to Windows 10 due to the lengthy and costly certification process, indicating that the situation was not planned but rather an unintended consequence of using outdated software [86946].
Duration permanent (a) The software failure incident mentioned in the articles is more likely to be permanent. This is because the issue highlighted in the articles is the fact that many election systems across the U.S., including in Pennsylvania and other battleground states, are still running on Windows 7 or older operating systems that are reaching their end of life. Microsoft is ending support for Windows 7, which means no more security updates or patches will be provided after a certain date. This leaves the systems vulnerable to hackers exploiting software vulnerabilities [86946]. The potential consequences of not updating the systems could have a lasting impact on the security and integrity of election systems, making it a permanent issue until addressed.
Behaviour crash, omission, timing (a) crash: The article mentions the WannaCry ransomware attack in 2017, which froze systems in 200,000 computers across 150 countries, indicating a crash scenario where the systems lost their state and were unable to perform their intended functions [86946]. (b) omission: The article discusses the issue of election systems running on outdated software like Windows 7, which will soon be vulnerable to hackers due to the lack of technical support and patches. This omission to update the software can lead to the system omitting to perform its intended functions securely [86946]. (c) timing: The article highlights the upcoming end of support for Windows 7, which could lead to the systems performing their functions correctly but at the wrong time due to the lack of timely updates and security patches [86946]. (d) value: There is no specific mention of a failure due to the system performing its intended functions incorrectly in the articles. (e) byzantine: The articles do not provide information about a failure due to the system behaving erroneously with inconsistent responses and interactions. (f) other: The articles do not describe a failure behavior that falls outside of the options provided.

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence property, theoretical_consequence (d) property: People's material goods, money, or data was impacted due to the software failure The software failure incident discussed in the articles pertains to the use of outdated operating systems like Windows 7 in election systems, which poses a security risk due to the lack of technical support and patches from Microsoft. This vulnerability could potentially lead to hackers exploiting the systems, compromising the integrity of election data and potentially impacting the election results [86946].
Domain government The software failure incident discussed in the articles is related to the **government** industry. The incident specifically pertains to election systems used by various states in the U.S., highlighting the issue of outdated software (Windows 7) being utilized in critical election processes, which could potentially expose vulnerabilities to hackers and compromise the integrity of elections [86946].

Sources

Back to List