0% found this document useful (0 votes)
11 views8 pages

pci_vulnerability_report

Vulnerability report PCI
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views8 pages

pci_vulnerability_report

Vulnerability report PCI
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

PCI Scan Vulnerability Report

PCI Scan Vulnerability Report

PCI Status
The following table highlights the overall compliance status and each individual system's compliance status. Following the table is a detailed report specifying each
system and its specific vulnerabilities.

Overall PCI Status PASS


Live IP Address Scanned Security Risk Rating PCI Status

Sysnet Scanning Management System January 07, 2024 Page 2


PCI Scan Vulnerability Report

Report Summary
Company: SEROHEY SONS LIMITED
Hosts in account 1
Hosts scanned 1
Hosts active 0
Scan date January 07, 2024
Report date January 07, 2024

Summary of Vulnerabilities
Vulnerabilities total: 0 Security risk: 0

by Severity
Severity Confirmed Potential Information gathered Total
5 0 0 0 0
4 0 0 0 0
3 0 0 0 0
2 0 0 0 0
1 0 0 0 0
Total 0 0 0 0

by PCI Severity
PCI Severity Confirmed Potential Total
High 0 0 0
Medium 0 0 0
Low 0 0 0
Total 0 0 0

Sysnet Scanning Management System January 07, 2024 Page 3


PCI Scan Vulnerability Report

Sysnet Scanning Management System January 07, 2024 Page 4


PCI Scan Vulnerability Report

Sysnet Scanning Management System January 07, 2024 Page 5


PCI Scan Vulnerability Report

Appendices

Hosts Scanned

Hosts Not Alive


82.35.70.91

Option Profile

Scan
Scanned TCP Ports: Full
Scanned UDP Ports: Standard Scan
Scan Dead Hosts: Off
Load Balancer Detection: Off
Password Brute Forcing Standard
Vulnerability Detection Complete
Windows Authentication: Disabled
SSH Authentication: Disabled
Oracle Authentication: Disabled
SNMP Authentication: Disabled
Perform 3-way Handshake: Off

Advanced
Hosts Discovery: TCP Standard Scan, UDP Standard Scan, ICMP On
Ignore RST packets: Off
Ignore firewall-generated SYN-ACK packets: Off
Do not send ACK or SYN-ACK packets during host discovery: Off

Report Legend

Payment Card Industry (PCI) Status


An overall PCI compliance status of PASSED indicates that all hosts in the report passed the PCI compliance standards. A PCI compliance status of PASSED for a single
host/IP indicates that no vulnerabilities or potential vulnerabilities, as defined by the PCI DSS compliance standards set by the PCI Council, were detected on the host.

An overall PCI compliance status of FAILED indicates that at least one host in the report failed to meet the PCI compliance standards. A PCI compliance status of FAILED
for a single host/IP indicates that at least one vulnerability or potential vulnerability, as defined by the PCI DSS compliance standards set by the PCI Council, was
detected on the host.

Vulnerability Levels
A Vulnerability is a design flaw or mis-configuration which makes your network (or a host on your network) susceptible to malicious attacks from local or remote users.
Vulnerabilities can exist in several areas of your network, such as in your firewalls, FTP servers, Web servers, operating systems or CGI bins. Depending on the level of
the security risk, the successful exploitation of a vulnerability can vary from the disclosure of information about the host to a complete compromise of the host.

Sysnet Scanning Management System January 07, 2024 Page 6


PCI Scan Vulnerability Report

Severity Level Description


1 Minimal Intruders can collect information about the host (open ports, services, etc.) and may be able to use this information to find other
vulnerabilities.
2 Medium Intruders may be able to collect sensitive information from the host, such as the precise version of software installed. With this information,
intruders can easily exploit known vulnerabilities specific to software versions.
3 Serious Intruders may be able to gain access to specific information stored on the host, including security settings. This could result in potential
misuse of the host by intruders. For example, vulnerabilities at this level may include partial disclosure of file contents, access to certain files
on the host, directory browsing, disclosure of filtering rules and security mechanisms, denial of service attacks, and unauthorized use of
services, such as mail-relaying.
4 Critical Intruders can possibly gain control of the host, or there may be potential leakage of highly sensitive information. For example, vulnerabilities
at this level may include full read access to files, potential backdoors, or a listing of all the users on the host.
5 Urgent Intruders can easily gain control of the host, which can lead to the compromise of your entire network security. For example, vulnerabilities
at this level may include full read and write access to files, remote execution of commands, and the presence of backdoors.

Severity Level Description


Low A vulnerability with a CVSS base score of 0.0 through 3.9. These vulnerabilities are not required to be fixed to pass PCI compliance.

Medium A vulnerability with a CVSS base score of 4.0 through 6.9. These vulnerabilities must be fixed to pass PCI compliance.

High A vulnerability with a CVSS base score of 7.0 through 10.0. These vulnerabilities must be fixed to pass PCI compliance.

Potential Vulnerability Levels


A potential vulnerability is one which we cannot confirm exists. The only way to verify the existence of such vulnerabilities on your network would be to perform an
intrusive scan, which could result in a denial of service. This is strictly against our policy. Instead, we urge you to investigate these potential vulnerabilities further.

Severity Level Description


1 Minimal If this vulnerability exists on your system, intruders can collect information about the host (open ports, services, etc.) and may be able to use
this information to find other vulnerabilities.
2 Medium If this vulnerability exists on your system, intruders may be able to collect sensitive information from the host, such as the precise version of
software installed. With this information, intruders can easily exploit known vulnerabilities specific to software versions.
3 Serious If this vulnerability exists on your system, intruders may be able to gain access to specific information stored on the host, including security
settings. This could result in potential misuse of the host by intruders. For example, vulnerabilities at this level may include partial disclosure
of file contents, access to certain files on the host, directory browsing, disclosure of filtering rules and security mechanisms, denial of service
attacks, and unauthorized use of services, such as mail-relaying.
4 Critical If this vulnerability exists on your system, intruders can possibly gain control of the host, or there may be potential leakage of highly
sensitive information. For example, vulnerabilities at this level may include full read access to files, potential backdoors, or a listing of all the
users on the host.
5 Urgent If this vulnerability exists on your system, intruders can easily gain control of the host, which can lead to the compromise of your entire
network security. For example, vulnerabilites at this level may include full read and write access to files, remote execution of commands,
and the presence of backdoors.

Sysnet Scanning Management System January 07, 2024 Page 7


PCI Scan Vulnerability Report

Severity Level Description


Low A potential vulnerability with a CVSS base score of 0.0 through 3.9. These vulnerabilities are not required to be fixed to pass PCI
compliance.
Medium A potential vulnerability with a CVSS base score of 4.0 through 6.9. These vulnerabilities must be fixed to pass PCI compliance.

High A potential vulnerability with a CVSS base score of 7.0 through 10.0. These vulnerabilities must be fixed to pass PCI compliance.

Information Gathered
Information Gathered includes visible information about the network related to the host, such as traceroute information, Internet Service Provider (ISP), or a list of
reachable hosts. Information Gathered severity levels also include Network Mapping data, such as detected firewalls, SMTP banners, or a list of open TCP services.

Severity Level Description


1 Minimal Intruders may be able to retrieve sensitive information related to the host, such as open UDP and TCP services lists, and detection of
firewalls.
2 Medium Intruders may be able to determine the operating system running on the host, and view banner versions.

3 Serious Intruders may be able to detect highly sensitive data, such as global system user lists.

Sysnet Scanning Management System January 07, 2024 Page 8

You might also like