It is reported that the GEMS Central Tabulator stores received votes in three segregated regions of an Access database. The GEMs system harvests data from each of these database regions in order to generate reports. All of the tables in these separate database regions are linked together in an attempt to prevent database tampering, by ensuring that the table data corresponds to table data in other database regions. The Diebold GEMS Central Tabulator is reported prone to a vulnerability, where a two-digit code can be entered into a hidden location to de-link the tables in the GEMS database. This will permit an attacker to add sets of fake votes.
It is reported that the GEMS Central Tabulator stores received votes in three segregated regions of an Access database. The GEMs system harvests data from each of these database regions in order to generate reports. All of the tables in these separate database regions are linked together in an attempt to prevent database tampering, by ensuring that the table data corresponds to table data in other database regions. The Diebold GEMS Central Tabulator is reported prone to a vulnerability, where a two-digit code can be entered into a hidden location to de-link the tables in the GEMS database. This will permit an attacker to add sets of fake votes.