Pci Vulnerability Report
Pci Vulnerability Report
PCI Status
The following table highlights the overall compliance status and each individual system's compliance status. Following the table is a detailed report specifying each
system and its specific vulnerabilities.
Report Summary
Company: HETHERSETT FISH BAR LTD
Hosts in account 1
Hosts scanned 1
Hosts active 1
Scan date October 25, 2024
Report date October 25, 2024
Summary of Vulnerabilities
Vulnerabilities total: 7 Security risk: 0
by Severity
Severity Confirmed Potential Information gathered Total
5 0 0 0 0
4 0 0 0 0
3 0 0 0 0
2 0 0 0 0
1 0 0 7 7
Total 0 0 7 7
by PCI Severity
PCI Severity Confirmed Potential Total
High 0 0 0
Medium 0 0 0
Low 0 0 0
Total 0 0 0
Detailed Results
VULNERABILITY DETAILS
Severity: 1
QID: 6
Category: Information gathering
CVE ID: -
Vendor Reference: -
Bugtraq ID: -
Last Update: 2018-01-04 17:39:37.0
THREAT:
The fully qualified domain name of this host, if it was obtained from a DNS server, is displayed in the RESULT section.
IMPACT:
N/A
SOLUTION:
N/A
RESULT:
VULNERABILITY DETAILS
Severity: 1
QID: 82056
Category: TCP/IP
CVE ID: -
Vendor Reference: -
Bugtraq ID: -
Last Update: 2004-10-07 18:04:44.0
THREAT:
Attempts to obtain the fully-qualified domain name (FQDN) or the Netbios name failed for this host.
IMPACT:
N/A
SOLUTION:
N/A
RESULT:
N/A
VULNERABILITY DETAILS
Severity: 1
QID: 45038
Category: Information gathering
CVE ID: -
Vendor Reference: -
Bugtraq ID: -
Last Update: 2022-09-15 18:02:52.0
THREAT:
The Host Scan Time is the period of time it takes the scanning engine to perform the vulnerability assessment of a single target host. The Host Scan Time for this host is
reported in the Result section below.
The Host Scan Time does not have a direct correlation to the Duration time as displayed in the Report Summary section of a scan results report. The Duration is the
period of time it takes the service to perform a scan task. The Duration includes the time it takes the service to scan all hosts, which may involve parallel scanning. It also
includes the time it takes for a scanner appliance to pick up the scan task and transfer the results back to the service's Secure Operating Center. Further, when a scan
task is distributed across multiple scanners, the Duration includes the time it takes to perform parallel host scanning on all scanners.
IMPACT:
N/A
SOLUTION:
N/A
RESULT:
Scan duration: 2504 seconds
VULNERABILITY DETAILS
Severity: 1
QID: 45005
Category: Information gathering
CVE ID: -
Vendor Reference: -
Bugtraq ID: -
Last Update: 2013-09-27 19:31:33.0
THREAT:
The information shown in the Result section was returned by the network infrastructure responsible for routing traffic from our cloud platform to the target network (where
the scanner appliance is located).
This information was returned from: 1) the WHOIS service, or 2) the infrastructure provided by the closest gateway server to our cloud platform. If your ISP is routing
traffic, your ISP's gateway server returned this information.
IMPACT:
This information can be used by malicious users to gather more information about the network infrastructure that may aid in launching further attacks against it.
SOLUTION:
N/A
RESULT:
The ISP network handle is: 46-RIPE
ISP Network description:
RIPE Network Coordination Centre
VULNERABILITY DETAILS
Severity: 1
QID: 82040
Category: TCP/IP
CVE ID: -
Vendor Reference: -
Bugtraq ID: -
Last Update: 2003-01-16 20:14:30.0
THREAT:
ICMP (Internet Control and Error Message Protocol) is a protocol encapsulated in IP packets. ICMP's principal purpose is to provide a protocol layer that informs
gateways of the inter-connectivity and accessibility of other gateways or hosts.
We have sent the following types of packets to trigger the host to send us ICMP replies:
Listed in the "Result" section are the ICMP replies that we have received.
IMPACT:
N/A
SOLUTION:
N/A
RESULT:
Traceroute
VULNERABILITY DETAILS
Severity: 1
QID: 45006
Category: Information gathering
CVE ID: -
Vendor Reference: -
Bugtraq ID: -
Last Update: 2003-05-09 18:28:51.0
THREAT:
Traceroute describes the path in realtime from the scanner to the remote host being contacted. It reports the IP addresses of all the routers in between.
IMPACT:
N/A
SOLUTION:
N/A
RESULT:
Firewall Detected
VULNERABILITY DETAILS
Severity: 1
QID: 34011
Category: Firewall
CVE ID: -
Vendor Reference: -
Bugtraq ID: -
Last Update: 2019-04-22 02:37:57.0
THREAT:
A packet filtering device protecting this IP was detected. This is likely to be a firewall or a router using access control lists (ACLs).
IMPACT:
N/A
SOLUTION:
N/A
RESULT:
Some of the ports filtered by the firewall are: 20, 21, 22, 23, 25, 53, 80, 111, 135, 443.
Appendices
Hosts Scanned
85.203.36.175
Option Profile
Scan
Scanned TCP Ports: Full
Scanned UDP Ports: Standard Scan
Scan Dead Hosts: Off
Load Balancer Detection: Off
Password Brute Forcing Standard
Vulnerability Detection Complete
Windows Authentication: Disabled
SSH Authentication: Disabled
Oracle Authentication: Disabled
SNMP Authentication: Disabled
Perform 3-way Handshake: Off
Advanced
Hosts Discovery: TCP Standard Scan, UDP Standard Scan, ICMP On
Ignore RST packets: Off
Ignore firewall-generated SYN-ACK packets: Off
Do not send ACK or SYN-ACK packets during host discovery: Off
Report Legend
An overall PCI compliance status of FAILED indicates that at least one host in the report failed to meet the PCI compliance standards. A PCI compliance status of FAILED
for a single host/IP indicates that at least one vulnerability or potential vulnerability, as defined by the PCI DSS compliance standards set by the PCI Council, was
detected on the host.
Vulnerability Levels
A Vulnerability is a design flaw or mis-configuration which makes your network (or a host on your network) susceptible to malicious attacks from local or remote users.
Vulnerabilities can exist in several areas of your network, such as in your firewalls, FTP servers, Web servers, operating systems or CGI bins. Depending on the level of
the security risk, the successful exploitation of a vulnerability can vary from the disclosure of information about the host to a complete compromise of the host.
Medium A vulnerability with a CVSS base score of 4.0 through 6.9. These vulnerabilities must be fixed to pass PCI compliance.
High A vulnerability with a CVSS base score of 7.0 through 10.0. These vulnerabilities must be fixed to pass PCI compliance.
High A potential vulnerability with a CVSS base score of 7.0 through 10.0. These vulnerabilities must be fixed to pass PCI compliance.
Information Gathered
Information Gathered includes visible information about the network related to the host, such as traceroute information, Internet Service Provider (ISP), or a list of
reachable hosts. Information Gathered severity levels also include Network Mapping data, such as detected firewalls, SMTP banners, or a list of open TCP services.
3 Serious Intruders may be able to detect highly sensitive data, such as global system user lists.