Richard Nelson, a credible security researcher, discovered a significant vulnerability in Australia's Express Plus Medicare COVID-19 digital certificate system in September 2021 [1].
Nelson found it was trivial to make the Medicare app display a valid-looking COVID-19 vaccine certificate through what he describes as a "man-in-the-middle" vulnerability [2].
During Budget Estimates hearings in late 2021, when grilled by Labor senators about the security vulnerabilities, Services Australia explicitly stated: "There are currently no vulnerability disclosure programs in place nor any future plans to implement such a program for the digital vaccination certificates" [4].
When he discovered the vulnerability, he faced significant challenges in reporting it through proper channels [1].
他嘗試 tā cháng shì 了 le 多種 duō zhǒng 回報 huí bào 途徑 tú jìng : :
He attempted multiple reporting pathways:
- Tried calling Services Australia directly but gave up after being placed on hold [1]
- Found the Department of Health had a Vulnerability Disclosure Policy, but Express Plus Medicare fell under Services Australia, not Health [1]
- Reported it via ReportCyber and the Australian Signals Directorate (ASD), but received no response until days later [1]
- Only after publicly tweeting about the vulnerability and being contacted by journalists did Services Australia appear to take action [1]
Nelson noted that Services Australia did not reach out to him after he went public via Twitter and media, likely because the issue had become sensitive and the agency wanted to avoid additional press coverage [1].
Government Cybersecurity Framework Existed:** Services Australia claimed to undertake "full cyber assessments several times a year" and stated it "work[s] closely with the Australian Signals Directorate and Australian Cyber Security Centre on potential vulnerabilities on mobile applications" [4].
Some Agencies Had Vulnerability Disclosure Programs:** While Services Australia lacked a VDP, other Australian government agencies had implemented them.
The Department of Home Affairs had a Vulnerability Disclosure Program in place [6], and Service NSW operated a bug bounty program through Bugcrowd [7].
這顯示 zhè xiǎn shì 各機構 gè jī gòu 實施 shí shī 情況 qíng kuàng 不 bù 一致 yí zhì , , 而 ér 非全 fēi quán 政府 zhèng fǔ 範圍 fàn wéi 的 de 政策 zhèng cè 失敗 shī bài 。 。
This suggests inconsistent implementation across agencies rather than a government-wide policy failure.
**3.
Severity Assessment:** Services Australia characterized the required attack as something that "require[s] significant knowledge and expertise" [4], suggesting they viewed the practical risk as lower than the theoretical vulnerability might suggest.
Tampering:** The vulnerability involved making the app display a false certificate (client-side vulnerability) rather than creating counterfeit certificates that would pass backend validation.
Timeline of Rollout:** The COVID-19 digital certificate was introduced relatively hastily during pandemic conditions (rolled out in mid-2021) [8].
來源可信度評估
### ### 原始 yuán shǐ 資料 zī liào 來源 lái yuán
### Original Sources
* * * * Richard Richard Nelson Nelson ( ( Medium Medium 文章 wén zhāng ) ) : : * * * *
**Richard Nelson (Medium article):**
- Credible security researcher with demonstrable expertise; his other Medium articles show deep technical knowledge of government security systems (COVIDSafe analysis, Service NSW driver license reverse engineering) [1]
- Personal account of attempting responsible disclosure; makes genuine effort to follow proper procedures before going public [1]
- Transparent about his frustration and emotional state; acknowledges the difficulty of his position [1]
- Appears motivated by public security, not partisan politics; no evidence of political alignment toward Labor [1]
**ZDNet (Campbell Kwan article):**
- Mainstream technology news outlet with editorial standards [9]
- Reports on Budget Estimates proceedings, which are documented public records [4]
- Accurately cites the government's own statements; quotes are verifiable [4]
- Campbell Kwan is a regular contributor on government technology issues [9]
- However, the article emphasizes criticism from Labor senators and doesn't deeply explore government rationale or mitigating context
Neither source appears primarily motivated by partisan bias, though the ZDNet article gives prominence to Labor senators' criticisms in a federal Budget Estimates context.
This is appropriate for security reporting—the vulnerability was real and the response was inadequate—but the framing is inherently critical rather than neutral.
**Did Labor have significant cybersecurity issues with digital health systems?**
Search conducted: "Labor government Australian digital health system cybersecurity privacy breach MyHealth Records"
Labor's handling of the My Health Record system shows relevant precedent.
* * * *
The My Health Record was introduced by the Labor government in 2012 and became highly controversial [10].
The system faced significant privacy concerns, leading Labor itself to call for a suspension of the rollout when the Coalition expanded it [11].
Labor Labor 對 duì My My Health Health Record Record 系統 xì tǒng 的 de 處理 chù lǐ 顯示 xiǎn shì 出 chū 相關 xiāng guān 先例 xiān lì 。 。
The Privacy Commissioner raised concerns, and there was substantial public backlash [10].
My My Health Health Record Record 於 yú 2012 2012 年 nián 由 yóu Labor Labor 政府 zhèng fǔ 推出 tuī chū , , 引發 yǐn fā 高度 gāo dù 爭議 zhēng yì [ [ 10 10 ] ] 。 。
While this represents a broader policy failure (flawed design from the start) rather than a cybersecurity vulnerability disclosure issue specifically, it demonstrates that Labor governments have also struggled with digital health system security and public trust in similar areas.
**Comparable Cybersecurity Incident:** There is no evidence of Labor government digital health systems facing similar cybersecurity vulnerability disclosure policy gaps during their period in government (2007-2013).
However, the broader theme of inadequate digital security governance appears to be a systemic Australian government issue across parties rather than unique to the Coalition.
**Government's Position:**
Services Australia maintained that the COVID-19 digital certificate system included multiple security layers and that the vulnerability discovered required "significant knowledge and expertise" to exploit [4].
The government's perspective was that while the vulnerability should be addressed, it was not a critical failure requiring immediate overhaul of the entire system.
**Security Expert Perspective:**
Richard Nelson's position is well-reasoned from a security governance standpoint: even if a vulnerability requires expertise to exploit, proper channels for responsible disclosure should exist.
This is a legitimate concern about institutional security maturity, not just about the existence of any single vulnerability.
**Systemic Issue vs.
Richard Richard Nelson Nelson 的 de 立場 lì chǎng 從 cóng 安全 ān quán 治理 zhì lǐ 角度 jiǎo dù 來 lái 看 kàn 是 shì 合理 hé lǐ 的 de : : 即使 jí shǐ 漏洞 lòu dòng 需要 xū yào 專業 zhuān yè 知識 zhī shí 才能 cái néng 利用 lì yòng , , 負責任 fù zé rèn 披露 pī lù 的 de 適當 shì dāng 渠道 qú dào 也 yě 應該 yīng gāi 存在 cún zài 。 。
Malicious Intent:**
The evidence suggests this was primarily a systemic governance failure (lack of formal processes) rather than negligence or malicious intent.
他 tā 認為 rèn wèi 這是 zhè shì 標準 biāo zhǔn 行業 xíng yè 實務 shí wù , , 而 ér 缺乏 quē fá 此類 cǐ lèi 渠道 qú dào 正是 zhèng shì 迫使 pò shǐ 他 tā 公開 gōng kāi 問題 wèn tí 的 de 原因 yuán yīn [ [ 1 1 ] ] 。 。
Services Australia demonstrated awareness of security concerns and was conducting assessments [4].
The failure was in not having established, well-publicized, responsive channels for researchers to report vulnerabilities—a process issue rather than a technical issue.
**Industry Practice Context:**
Vulnerability disclosure programs (VDPs) and bug bounties have become industry standard practice across major tech companies and, increasingly, government agencies.
* * * * 系統性 xì tǒng xìng 問題 wèn tí vs vs . . 惡意 è yì 意圖 yì tú : : * * * *
The ASD and Cyber.gov.au have published guidance on implementing VDPs [12].
By 2021, the absence of a formal VDP for a public-facing COVID safety system was notably behind current best practices, though it wasn't unique to Australia or the Coalition government at that time.
**Key context:** The vulnerability disclosure issue is genuinely problematic and represents a failure to follow established cybersecurity best practices.
However, it's not clear this was unique to the Coalition's COVID response or that Labor governments would necessarily have handled it differently—the My Health Record case shows digital health system governance has been challenging across parties.
關於 guān yú Services Services Australia Australia 缺乏 quē fá 漏洞 lòu dòng 披露 pī lù 計畫 jì huà 及 jí 回報 huí bào 漏洞 lòu dòng 困難 kùn nán 的 de 具體 jù tǐ 事實 shì shí 性陳述 xìng chén shù 是 shì * * * * 準確 zhǔn què 且 qiě 經過 jīng guò 驗證 yàn zhèng 的 de * * * * 。 。
The specific factual claims about Services Australia's lack of a vulnerability disclosure program and the difficulty in reporting vulnerabilities are **accurate and verified**.
However, the broader claim requires qualification:
1. ✅ **TRUE:** Services Australia had no vulnerability disclosure program and explicitly stated no plans to implement one [4]
2. ✅ **TRUE:** Reporting vulnerabilities was unnecessarily difficult and no effective process existed [1]
3. ✅ **TRUE:** Response was slow and only accelerated after public disclosure [1]
4. ⚠️ **PARTIALLY TRUE:** Claims about "not following cybersecurity best practice" are valid, but government was conducting cyber assessments and working with ASD; the failure was specifically in public vulnerability disclosure processes, not all cybersecurity practices [4]
5. ⚠️ **MISLEADING FRAMING:** The claim's implication that this was uniquely egregious Coalition-era mismanagement is not well-supported.
1 1 . . ✅ ✅ * * * * 屬實 shǔ shí : : * * * * Services Services Australia Australia 沒有 méi yǒu 漏洞 lòu dòng 披露 pī lù 計畫 jì huà , , 並明確 bìng míng què 表示 biǎo shì 無意 wú yì 實施 shí shī [ [ 4 4 ] ]
Labor government digital health projects (My Health Record) faced similar governance and security trust issues [10, 11]
6. ⚠️ **CONTEXT MISSING:** During pandemic conditions in 2021, rapid deployment of public health infrastructure sometimes competed with security maturity; this doesn't excuse the failure but provides context
The verdict is that the core facts are sound, the criticism is legitimate, but the framing overstates uniqueness or severity without acknowledging comparable issues in Labor's digital health governance.
關於 guān yú Services Services Australia Australia 缺乏 quē fá 漏洞 lòu dòng 披露 pī lù 計畫 jì huà 及 jí 回報 huí bào 漏洞 lòu dòng 困難 kùn nán 的 de 具體 jù tǐ 事實 shì shí 性陳述 xìng chén shù 是 shì * * * * 準確 zhǔn què 且 qiě 經過 jīng guò 驗證 yàn zhèng 的 de * * * * 。 。
The specific factual claims about Services Australia's lack of a vulnerability disclosure program and the difficulty in reporting vulnerabilities are **accurate and verified**.
However, the broader claim requires qualification:
1. ✅ **TRUE:** Services Australia had no vulnerability disclosure program and explicitly stated no plans to implement one [4]
2. ✅ **TRUE:** Reporting vulnerabilities was unnecessarily difficult and no effective process existed [1]
3. ✅ **TRUE:** Response was slow and only accelerated after public disclosure [1]
4. ⚠️ **PARTIALLY TRUE:** Claims about "not following cybersecurity best practice" are valid, but government was conducting cyber assessments and working with ASD; the failure was specifically in public vulnerability disclosure processes, not all cybersecurity practices [4]
5. ⚠️ **MISLEADING FRAMING:** The claim's implication that this was uniquely egregious Coalition-era mismanagement is not well-supported.
1 1 . . ✅ ✅ * * * * 屬實 shǔ shí : : * * * * Services Services Australia Australia 沒有 méi yǒu 漏洞 lòu dòng 披露 pī lù 計畫 jì huà , , 並明確 bìng míng què 表示 biǎo shì 無意 wú yì 實施 shí shī [ [ 4 4 ] ]
Labor government digital health projects (My Health Record) faced similar governance and security trust issues [10, 11]
6. ⚠️ **CONTEXT MISSING:** During pandemic conditions in 2021, rapid deployment of public health infrastructure sometimes competed with security maturity; this doesn't excuse the failure but provides context
The verdict is that the core facts are sound, the criticism is legitimate, but the framing overstates uniqueness or severity without acknowledging comparable issues in Labor's digital health governance.