PCI DSS Sample Report
PCI DSS Sample Report
strict compliance with internal and external regulatory requirements for our IT operations and
services, including: PCI DSS 3.2 Level 2 Audit, AICPA SOC 1 & 2 Audit, ISO 27001-2013, and
ISO/IEC 27701:2019 certification for UK Operations.
PCI ASV Scan Report Attestation of Scan Compliance
IP: 221.99.1.53 CVE-2016-0778 Name: CVE-2016-0778 - OpenSSH - Buffer Overflow Issue PCI: Fail
Port: 22/tcp Action: Upgrade OpenBSD OpenSSH to version 7.2.0
Hostname: Pass/Fail Reason:
Service: SSH CVSS: 4.6 - Medium - (AV:N/AC:H/Au:S/C:P/I:P/A:P/E:F/RL:OF/RC:C) EID: 87207
Description: OpenSSH is an open-source implementation of the SSH protocol. A buffer overflow vulnerability has been discovered in OpenSSH, when certain proxy and forward options are enabled. This vulnerability could allow an attacker to
cause denial-of-service conditions.
Evidence: SSH-2.0-OpenSSH_6.7p1 Debian-5+deb8u3
Impact: This application is prone to this vulnerability because of a boundary condition error, allowing an attacker to cause denial-of-service conditions.
Solution: It is recommended that users upgrade to the latest version of OpenSSH. This vulnerability has been fixed in OpenSSH 7.1p2.
References:
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10734
http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
http://www.openssh.com/txt/release-7.1p2
http://www.openwall.com/lists/oss-security/2016/01/14/7
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
http://www.securityfocus.com/bid/80698
https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/
https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375
https://support.apple.com/HT206167
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0778
IP: 221.99.1.53 CVE-2016-0777 Name: CVE-2016-0777 - OpenSSH - Information Disclosure Issue PCI: Fail
Port: 22/tcp Action: Upgrade OpenBSD OpenSSH to version 7.2.0
Hostname: Pass/Fail Reason:
Service: SSH CVSS: 4.0 - Medium - (AV:N/AC:L/Au:S/C:P/I:N/A:N/E:F/RL:OF/RC:C) EID: 87206
Description: OpenSSH is an open-source implementation of the SSH protocol. An information disclosure vulnerability has been discovered in OpenSSH. This vulnerability could allow an attacker to obtain sensitive information from process
memory.
Evidence: SSH-2.0-OpenSSH_6.7p1 Debian-5+deb8u3
Impact: This application is prone to this vulnerability because of an unknown error, allowing an attacker to obtain sensitive information from process memory.
Part 2. Vulnerability Details
Solution: It is recommended that users upgrade to the latest version of OpenSSH. This vulnerability has been fixed in OpenSSH 7.1p2.
It is recommended that Red Hat users apply the following workaround to fix this vulnerability:
In Red Hat Enterprise Linux 7 you can mitigate this issue by setting the following option in the OpenSSH client's configuration file, either global (/etc/ssh/ssh_config) or user specific (~/.ssh/config):
UseRoaming no
The above directive should be placed in the Host * section of the configuration file to use this setting for all SSH servers the client connects to.
You can also set the option via a command line argument when connecting to an SSH server:
-o 'UseRoaming no'
References:
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10734
http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
http://www.openssh.com/txt/release-7.1p2
http://www.openwall.com/lists/oss-security/2016/01/14/7
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
http://www.securityfocus.com/bid/80695
https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/
https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375
https://support.apple.com/HT206167
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0777
IP: 221.99.1.53 No CVE assigned Name: Clickjacking - X-Frame-Options Header missing PCI: Fail
Port: 80/tcp Action: Reconfigure Service to be More Secure
Hostname: Pass/Fail Reason:
No NIST CVSS base score is available; exposure rated by vendor (fail)
Service: HTTP CVSS: 6.8 - Medium - (AV:N/AC:M/Au:N/C:P/I:P/A:P/E:H/RL:ND/RC:C) EID: 81912
Description: The X-Frame-Options HTTP header field declares a policy, communicated from the server to the client browser, regarding whether the browser may display the transmitted content in frames that are part of other web pages. A
clickjacking vulnerability has been discovered when the X-Frame-Options Header is not set. This vulnerability could allow an attacker to disclose information or redirect users.
Evidence: Web Server, No details are available.
Impact: Web applications are prone to this vulnerability because of websites allowing framing from other domains, allowing an attacker to disclose information or redirect users.
Solution: It is recommended that users send the proper X-Frame-Options HTTP response headers that instruct the browser to not allow framing from other domains.
References:
https://developer.mozilla.org/en-US/docs/Web/HTTP/X-Frame-Options
https://www.owasp.org/index.php/Clickjacking
https://cwe.mitre.org/data/definitions/693.html
IP: 221.99.1.53 No CVE assigned Name: Autocomplete Password in Browser PCI: Fail
Port: 80/tcp Action: Reconfigure Service to be More Secure
Hostname: Pass/Fail Reason:
No NIST CVSS base score is available; exposure rated by vendor (fail)
Service: HTTP CVSS: 6.2 - Medium - (AV:L/AC:L/Au:S/C:C/I:C/A:N/E:F/RL:W/RC:C) EID: 25962
Description: The HTML application was found to contain a Username and Password box that does not explicitly disable the use of the web browsers password autocomplete function, this is considered unsafe and should be corrected.
Evidence: /, Password type input named <b><font color="dark">pwd</font></b> from <b>unnamed form</b> with action <b>login.php</b> has autocomplete enabled.
Impact: The password autocomplete should always be disabled, especially in sensitive applications, since an attacker, if able to access the browser cache, could obtain the password in cleartext (public computers are a very notable example of
this attack).
Solution: Check the HTML code of the login page to see whether browser caching of the passwords is disabled. The code for this will usually be along the following lines:
The "remember my password" mechanism can be implemented with one of the following methods:
Allowing the "cache password" feature in web browsers. As of 2014 this is the preferred method as all major browsers have disabled the setting of autocomplete="off" by default for password fields.
Storing the password in a permanent cookie. The password must be hashed/encrypted and not sent in the clear.
References:
http://www.owasp.org/index.php/Testing_for_Vulnerable_Remember_Password_and_Pwd_Reset
http://www.owasp.org/index.php/Guide_to_Authentication#Browser_remembers_passwords
https://www.owasp.org/index.php/Testing_for_Vulnerable_Remember_Password_(OTG-AUTHN-005)
https://developer.mozilla.org/en-US/docs/Web/Security/Securing_your_site/Turning_off_form_autocompletion
IP: 221.99.1.53 No CVE assigned Name: Web Service is Running PCI: Pass
Port: 80/tcp Action: Disable or Uninstall Unused Software
Part 2. Vulnerability Details
IP: 221.99.1.53 No CVE assigned Name: Web Service is Running PCI: Pass
Port: 443/tcp Action: Disable or Uninstall Unused Software
Hostname: Pass/Fail Reason:
No NIST CVSS base score is available; exposure rated by vendor (pass)
Service: HTTP CVSS: 2.1 - Low - (AV:L/AC:L/Au:N/C:P/I:N/A:N/E:ND/RL:ND/RC:ND) EID: 11438
Description: A web server is running on this port.
Evidence: Port: 443, Microsoft-HTTPAPI/2.0
Impact: There are many vulnerabilities that have been found with all versions of web servers.
Solution: If the web services on a machine are not essential then they should be removed.
References: