Friday, March 9, 013 PCI Vulnerability Validation Report Introduction This report shows the results of a vulnerability validation tests conducted by CORE Impact Professional Professional in support of the vulnerability management process referenced in the Payment Card Industry Data Security Standard (PCI DSS). This report and the vulnerability validation process are controls to help you manage vulnerabilities efficiently and intelligently in response to PCI DSS requirements. It does not guarantee that you can obtain PCI DSS certification. The PCI DSS calls for initial and regular vulnerability assessment scans to be conducted by Approved Scanning Vendors (ASV) to obtain and maintain PCI Certification. ASVs use some combination of commercial, open-source, and/or customized scanning tools to conduct network-based vulnerability scans. The results from the scans then need to be further audited to remove reported vulnerabilities that are false positives or have a compensating control in place to mitigate the vulnerability. The detailed results of the tests conducted to validate the reported vulnerability scans are included below. Reported vulnerabilities, affected targets, and the associated CVEs are imported from one of several supported market leading vulnerability scanners. For reported vulnerabilities where there is an exploit avalible, the targets are validated to ensure that they are susceptible to the reported vulnerability. A compromised target is proof positive of a major issue that must be resolved before obtaining PCI DSS certification. Vulnerabilities are sorted and grouped by exploits status: - Exploit Successful: this indicates CORE Impact Professional has an exploit for the identified, potential vulnerability; it was attempted by CORE Impact Professional and subsequently confirmed to have been successful against the target attempted. - Exploit Failed: this indicates CORE Impact Professional has an exploit for the identified, potential vulnerability; it was attempted by CORE Impact Professional and subsequently confirmed to have not been successful against the target attempted. - Exploit Not Attempted: CORE Impact Professional does have the exploit, but either the configuration of the test meant CORE Impact Professional was not able to attempt the exploit (i.e. exploits within CORE Impact Professional that have the potential to leave the targeted service unavailable) or the exploit is a DoS exploit, which are never attempted by automated components of CORE Impact Professional. Summary of vulnerability validation process 60.00% 0.00% 6.67% 13.33% Successful Failed Not Attempted Not Available CORE Impact Professional - PCI Vulnerability Validation Report Page 1
Workspace Summary Name: Started: Finished: Exact Time: Running Time: PCI Audit Q 013 3/9/013 1:53:00PM 3/9/013 1:49:43PM 56 minutes 43 seconds 5 minutes 59 seconds Details of vulnerability validation process Exploits Successful CVE-008-4038 Microsoft Windows SMB Buffer Underflow Exploit (MS08-063) CVE-010-79 Microsoft Windows Print Spooler Service Impersonation Exploit (MS10-061) CORE Impact Professional - PCI Vulnerability Validation Report Page
9.30 (HIGH) Medium Host: /19.168.13.77 [WIN1377] CVE-010-79 Microsoft Windows Print Spooler Service Impersonation Exploit (MS10-061) 9.30 (HIGH) Medium Exploits Failed CVE-008-450 MSRPC Server Service Remote Buffer Overflow Exploit (MS08-067) CORE Impact Professional - PCI Vulnerability Validation Report Page 3
Exploits Not Attempted CVE-008-4038 Microsoft Windows SMB Buffer Underflow DoS (MS08-063) CVE-008-4834 Microsoft Windows SMB Trans Buffer Overflow DoS (MS09-001) CORE Impact Professional - PCI Vulnerability Validation Report Page 4
Exploits Not Available Host: /19.168.13.44 CVE-1999-066 CVE-01-5886 CVE-01-5887 NOCVE-9999-35969 CVE-008-4114 CVE-008-4835 CVE-008-4841 CVE-010-163 CVE-011-0041 CORE Impact Professional - PCI Vulnerability Validation Report Page 5
Index Content Summary of vulnerability validation process Workspace Summary (PCI Audit Q 013) Details of vulnerability validation process Exploits Successful - Host: /19.168.13.77 Exploits Failed Exploits Not Attempted Exploits Not Available - Host: /19.168.13.44 Page 1 3 3 3 4 4 5 5 5 CORE Impact Professional - PCI Vulnerability Validation Report Page 6