Skip to content
SECURITY FAILURE

Systems used by courts and governments across the US riddled with vulnerabilities

With hundreds of courts and agencies affected, chances are one near you is, too.

Dan Goodin | 36
Credit: Getty Images
Credit: Getty Images
Story text

Public records systems that courts and governments rely on to manage voter registrations and legal filings have been riddled with vulnerabilities that made it possible for attackers to falsify registration databases and add, delete, or modify official documents.

Over the past year, software developer turned security researcher Jason Parker has found and reported dozens of critical vulnerabilities in no fewer than 19 commercial platforms used by hundreds of courts, government agencies, and police departments across the country. Most of the vulnerabilities were critical.

One flaw he uncovered in the voter registration cancellation portal for the state of Georgia, for instance, allowed anyone visiting it to cancel the registration of any voter in that state when the visitor knew the name, birthdate, and county of residence of the voter. In another case, document management systems used in local courthouses across the country contained multiple flaws that allowed unauthorized people to access sensitive filings such as psychiatric evaluations that were under seal. And in one case, unauthorized people could assign themselves privileges that are supposed to be available only to clerks of the court and, from there, create, delete, or modify filings.

Failing at the most fundamental level

It’s hard to overstate the critical role these systems play in the administration of justice, voting rights, and other integral government functions. The number of vulnerabilities—mostly stemming from weak permission controls, poor validation of user inputs, and faulty authentication processes—demonstrate a lack of due care in ensuring the trustworthiness of the systems millions of citizens rely on every day.

“These platforms are supposed to ensure transparency and fairness, but are failing at the most fundamental level of cybersecurity,” Parker wrote recently in a post he penned in an attempt to raise awareness. “If a voter’s registration can be canceled with little effort and confidential legal filings can be accessed by unauthorized users, what does it mean for the integrity of these systems?”

The vulnerability in the Georgia voter registration database, for instance, lacked any form of automated way to reject cancellation requests that omitted required voter information. Instead of flagging such requests, the system processed it without even flagging it. Similarly, the Granicus GovQA platform hundreds of government agencies use to manage public records could be hacked to reset passwords and gain access to usernames and email addresses simply by slightly modifying the Web address showing in a browser window.

And a vulnerability in the Thomson Reuters’ C-Track eFiling system allowed attackers to elevate their user status to that of a court administrator. Exploitation required nothing more than manipulating certain fields during the registration process.

There is no indication that any of the vulnerabilities were actively exploited.

Word of the vulnerabilities comes four months after the discovery of a malicious backdoor surreptitiously planted in a component of the JAVS Suite 8, an application package that 10,000 courtrooms around the world use to record, play back, and manage audio and video from legal proceedings. A representative of the company said Monday that an investigation performed in cooperation with the Cybersecurity and Infrastructure Security Agency concluded that the malware was installed on only two computers and didn’t result in any information being compromised. The representative said the malware was available through a file a threat actor posted to the JAVS public marketing website.

Parker began examining the systems last year as a software developer purely on a voluntary basis. He has worked with the Electronic Frontier Foundation to contact the system vendors and other parties responsible for the platforms he has found vulnerable. To date, all the vulnerabilities he has reported have been fixed, in some cases only in the past month. More recently, Parker has taken a job as a security researcher focusing on such platforms.

“Fixing these issues requires more than just patching a few bugs,” Parker wrote. “It calls for a complete overhaul of how security is handled in court and public record systems. To prevent attackers from hijacking accounts or altering sensitive data, robust permission controls must be immediately implemented, and stricter validation of user inputs enforced. Regular security audits and penetration testing should be standard practice, not an afterthought, and following the principles of Secure by Design should be an integral part of any Software Development Lifecycle.”

The 19 affected platforms are:

No. Vendor Platform Reported Fixed Disclosed URL
1 BluHorse Inmate Management 2023-10-25 0000-00-00 2023-11-06 https://ꩰ.com/@north/111365131136729011
2 Tyler Technologies Court Case Management Plus 2023-10-07 2023-11-01 2023-11-30 https://govtech.cc/README-2023-11-30-disorder-in-the-court.md
3 Catalis CMS360 2023-09-30 2023-11-03 2023-11-30 https://govtech.cc/README-2023-11-30-disorder-in-the-court.md
4 Henschen CaseLook 2023-10-11 2023-11-22 2023-11-30 https://govtech.cc/README-2023-11-30-disorder-in-the-court.md
5 Brevard County, Florida In-house 2023-10-03 2023-11-30 2023-11-30 https://govtech.cc/README-2023-11-30-disorder-in-the-court.md
6 Hillsborough County, Florida In-house 2023-10-03 2024-00-00 2023-11-30 https://govtech.cc/README-2023-11-30-disorder-in-the-court.md
7 Lee County, Florida In-house 2023-10-03 2023-11-29 2023-11-30 https://govtech.cc/README-2023-11-30-disorder-in-the-court.md
8 Monroe County, Florida In-house 2023-10-03 2023-11-28 2023-11-30 https://govtech.cc/README-2023-11-30-disorder-in-the-court.md
9 Sarasota County, Florida In-house 2023-10-03 2023-10-11 2023-11-30 https://govtech.cc/README-2023-11-30-disorder-in-the-court.md
10 Granicus eFiling 2023-12-18 2023-12-21 2024-03-02 https://github.com/qwell/disclosures/#granicus-efiling
11 Granicus GovQA 2024-02-27 2024-03-04 2024-03-07 https://govtech.cc/README-2024-03-07-granicus-govqa.md
12 Catalis EZ-Filing v3 2024-03-30 2024-04-30 2024-05-04 https://govtech.cc/README-2024-05-04-catalis-ez-filing-v3.md
13 Catalis EZ-Filing v4 2024-03-30 2024-04-30 2024-05-04 https://govtech.cc/README-2024-05-04-catalis-ez-filing-v4.md
14 Maricopa County, Arizona eFiling 2024-04-27 2024-05-16 2024-05-16 https://govtech.cc/README-2024-05-17-maricopa.md
15 NYPD Officer Profile Portal 2024-05-10 2024-05-14 2024-06-27 https://govtech.cc/README-2024-06-27-nypd-officer-profiles.md
16 Granicus eFiling 2024-03-31 2024-04-30 2024-09-27 https://govtech.cc/README-2024-09-27-granicus-efiling.md
17 Thomson Reuters C-Track 2024-06-03 2024-09-24 2024-09-26 https://govtech.cc/README-2024-09-26-thomson-reuters-ctrack.md
18 Granicus GovQA 2024-08-05 2024-08-09 2024-09-26 https://govtech.cc/README-2024-09-26-granicus-govqa.md
19 Georgia Secretary of State Voter Cancellation 2024-08-05 2024-08-05 2024-09-27 https://govtech.cc/README-2024-09-27-georgia-voter-registration-cancellation.md

Parker is urging vendors and customers alike to shore up the security of their systems by performing penetration testing and software audits and training employees, particularly those in IT departments. He also said that multifactor authentication should be universally available for all such systems.

“This series of disclosures is a wake-up call to all organizations that manage sensitive public data,” Parker wrote. “If they fail to act quickly, the consequences could be devastating—not just for the institutions themselves but for the individuals whose privacy they are sworn to protect. For now, the responsibility lies with the agencies and vendors behind these platforms to take immediate action, to shore up their defenses, and to restore trust in the systems that so many people depend on.”

Photo of Dan Goodin
Dan Goodin Senior Security Editor
Dan Goodin is Senior Security Editor at Ars Technica, where he oversees coverage of malware, computer espionage, botnets, hardware hacking, encryption, and passwords. In his spare time, he enjoys gardening, cooking, and following the independent music scene. Dan is based in San Francisco. Follow him at @dangoodin on Mastodon. Contact him on Signal at DanArs.82.
36 Comments
Staff Picks
A
"Parker is urging vendors and customers alike to shore up security of their systems by performing penetration testing and software audits and training employees, particularly those in IT departments. He also said that multi-factor authentication should be universally available for all such systems."

Aspirational at best. I'd love to see the governments in the US actually (not just lip service) buckle down and solve the severe threat current IT systems pose to our national security and privacy because they're actually intertwined concepts. You can't have one without the other.

But, court staffs are filled with people that can barely turn on computers, let alone understand the implications of their actions. They can't, and in many cases won't, think through things to their logical ends. Politicians that create and fund the mandates are no better, and in both cases theoretical ideological ends often override reality.

The vendors have no incentives to improve this system. There metrics are to minimize the number of support calls over the lifetime of their deployments. This disincentivizes changes to methods of access and utilization while incentivizing "common sense" - which is anything BUT common nor sensible in these cases - loop holes to security policies and enforcement.
Fatesrider
I worked with a lawyer as a client for decades, mostly tending to all of his IT needs. And that included the actual filing of the cases. I didn't need to be a lawyer to follow those instructions. He filled in the paperwork. I just made sure all the paperwork was filled in where it needed to be (a program helped do that automatically).

Then the clusterfuck began. Two systems had to authenticate, one of them was the case preparation software, and the other was to the courthouse, through a third party access portal called PACER.

Yes, you could log into the courthouse directly, but the program wouldn't let you auto-file the case, which saves like an hour and a half worth of nonsense. CASES were limited to about 10 MB (most are black and white PDF's, but it's very easy to exceed 10 MB for a complicated case), which threw errors and stuff that shouldn't have been there. And this is up until about 2022, when he finally retired.

For the record, this did not substantively change from the first time I was introduced to the program about 20 years previously. The procedures were the same, constant changing of passwords, constant requirements for "complicated passwords", and a host of other things. And the connection seemed to be set at 56K, which suggested to me that it had its origins during the dial up period. Faxing was still very, VERY common.

The point being, the court system filing and access appears to have been progressively built upon the rotting corpses of what came before, without the bother of clearing away the corpses.

I made a LOT of money troubleshooting the fucking thing, making it ten times harder to just do anything, but somehow not making it ten times more expensive, too. Except when you get paid by the hour and spend a couple of them on hold with tech support. Then it gets expensive.

So that they have vulnerabilities riddled throughout that system surprises me NOT AT ALL. It always seemed like a security protocol that was conceived sometime before I was born, made more complicated by budget and regulatory constraints across multiple entities and jurisdictions.

I mean, people say the wheels of justice grind slowly, but I it appears to be that the system has square wheels to start with. It makes for a very slow, and very bumpy ride.

I'm really glad I'm not fucking around with that thing anymore. And I feel sincere pity for those unfortunate souls who are.