pci_vulnerability_report
pci_vulnerability_report
PCI Status
The following table highlights the overall compliance status and each individual system's compliance status. Following the table is a detailed report specifying each
system and its specific vulnerabilities.
Report Summary
Company: SEROHEY SONS LIMITED
Hosts in account 1
Hosts scanned 1
Hosts active 0
Scan date January 07, 2024
Report date January 07, 2024
Summary of Vulnerabilities
Vulnerabilities total: 0 Security risk: 0
by Severity
Severity Confirmed Potential Information gathered Total
5 0 0 0 0
4 0 0 0 0
3 0 0 0 0
2 0 0 0 0
1 0 0 0 0
Total 0 0 0 0
by PCI Severity
PCI Severity Confirmed Potential Total
High 0 0 0
Medium 0 0 0
Low 0 0 0
Total 0 0 0
Appendices
Hosts Scanned
Option Profile
Scan
Scanned TCP Ports: Full
Scanned UDP Ports: Standard Scan
Scan Dead Hosts: Off
Load Balancer Detection: Off
Password Brute Forcing Standard
Vulnerability Detection Complete
Windows Authentication: Disabled
SSH Authentication: Disabled
Oracle Authentication: Disabled
SNMP Authentication: Disabled
Perform 3-way Handshake: Off
Advanced
Hosts Discovery: TCP Standard Scan, UDP Standard Scan, ICMP On
Ignore RST packets: Off
Ignore firewall-generated SYN-ACK packets: Off
Do not send ACK or SYN-ACK packets during host discovery: Off
Report Legend
An overall PCI compliance status of FAILED indicates that at least one host in the report failed to meet the PCI compliance standards. A PCI compliance status of FAILED
for a single host/IP indicates that at least one vulnerability or potential vulnerability, as defined by the PCI DSS compliance standards set by the PCI Council, was
detected on the host.
Vulnerability Levels
A Vulnerability is a design flaw or mis-configuration which makes your network (or a host on your network) susceptible to malicious attacks from local or remote users.
Vulnerabilities can exist in several areas of your network, such as in your firewalls, FTP servers, Web servers, operating systems or CGI bins. Depending on the level of
the security risk, the successful exploitation of a vulnerability can vary from the disclosure of information about the host to a complete compromise of the host.
Medium A vulnerability with a CVSS base score of 4.0 through 6.9. These vulnerabilities must be fixed to pass PCI compliance.
High A vulnerability with a CVSS base score of 7.0 through 10.0. These vulnerabilities must be fixed to pass PCI compliance.
High A potential vulnerability with a CVSS base score of 7.0 through 10.0. These vulnerabilities must be fixed to pass PCI compliance.
Information Gathered
Information Gathered includes visible information about the network related to the host, such as traceroute information, Internet Service Provider (ISP), or a list of
reachable hosts. Information Gathered severity levels also include Network Mapping data, such as detected firewalls, SMTP banners, or a list of open TCP services.
3 Serious Intruders may be able to detect highly sensitive data, such as global system user lists.