PCI, CVSS, & risk scoring FAQs (2024)

PCI, CVSS, & risk scoring frequently asked questions

This page concerns PCI compliance and scores related to vulnerabilties.

What are the risk scoring models in Nexpose, and how are they different?

Nexpose calculates risk scores for every asset and vulnerability that it finds during a scan. The scores indicate the potential danger that the vulnerability poses to network and business security based on impact and likelihood of exploit.

Two risk scoring models are available in Nexpose:

  • Temporal model
  • Weighted model

Temporal model

This model emphasizes the length of time that the vulnerability has been known to exist, as well as the nature of the risk. Older vulnerabilities are easier to exploit because attackers have known about them for a longer period of time. The Temporal risk model is a mathematical calculation of the following factors:

  • Time-based likelihood (t) is the number of days since vulnerability publicly disclosed. The overall score increases with the number of days.
  • Proximity-based impact is the sum of four variables:
    1. access vector (AV) or the likelihood of exploit, based on whether the target is locally accessible, is accessible from within the network, or must be accessed from outside the network; local access results in a higher score
    2. confidentiality impact (C) or disclosure to unauthorized individuals or systems
    3. integrity impact (I) or unauthorized data modification
    4. availability impact (A) or loss of access to data
  • exploit difficulty is the sum of two variables:
    1. access complexity (AC) or the likelihood of exploit based on how much skill is required to perform the exploit; an easier exploit results in a higher score
    2. authentication (Au) or the likelihood of exploit based on authentication requirements; no authentication results in a higher score

The score is expressed in high, whole numbers, ranging up to as many as six digits. There is no "highest" number. These numbers are relative to each other.

This scoring model is the most effective means to track the risk associated with vulnerabilities over time. Also, it is the ideal option for new deployments, since its emphasis on time and severity can help you to prioritize remediation projects better.

The following formula is used to calculate the Temporal scoring model:

PCI, CVSS, & risk scoring FAQs (1)

This formula can be broken down into its components as follows:

PCI, CVSS, & risk scoring FAQs (2)

Weighted model

The Weighted risk model is based primarily on asset data and vulnerability types, and it emphasizes the following factors:

  • vulnerability severity, which is the number—ranging from 1 to 10—that Nexpose calculates for each vulnerability
  • number of vulnerability instances
  • type of asset, such as a computer, router, or wireless access point (WAP)
  • number and types of services on the asset; for example, a database has higher business value
  • the level of importance, or weight, that you assign to a site when you configure it; see Creating and editing sites.

Weighted risk scores scale with the number of vulnerabilities. A higher number of vulnerabilities on an asset means a higher risk score. The score is expressed in lower—usually single-digit—numbers with decimals.

See Working with risk strategies to analyze threats.

Risk scores are important tools for prioritizing your vulnerability remediation projects. Another important metric is the CVSS score. See FAQ titled What is a CVSS score?

If I run a PCI scan and then generate a PCI report that indicates my environment is compliant, does that mean my environment is PCI-compliant?

If you are not an approved scan vendors (ASV), certified by the Payment Card Industry (PCI), then the answer is no. Only certified ASVs can perform PCI-sanctioned compliance audits. It is a good practice, though, to run PCI scans and reports in preparation for a compliance audit or as part of a security maintenance routine.

What is a"pass" or "fail" PCI audit result based on?

An ASV bases the audit result on the Common Vulnerability Scoring System (CVSS), Version 2, score that is calculated for every vulnerability. Scores range from 0 to 10.0, with 4.0 or higher indicating failure to comply with PCI standards.

Any asset that contains at least one vulnerability with CVSS score of 4.0 or higher is considered non-compliant. And, if at least one asset is non-compliant, the entire organization is considered to be non-compliant.

Also, any vulnerability that exposes an asset to XSS or SQL injection indicates failure to comply with PCI standards, regardless of CVSS score.

What is a CVSS score?

Nexpose ranks every discovered vulnerability according to various factors, including the Common Vulnerability Scoring System, Version 2 (CVSSv2). The CVSS score is a computation of base metrics that reflect how much risk a vulnerability poses to network security. Base metrics include access (ranging from local to remote), access complexity, required authentication, impact on data confidentiality, impact on data integrity, and impact on data availability.

The CVSS system rates all vulnerabilities on a scale of 0.0 to 10.0 with 10.0 representing the greatest security risk. A ranking of 4.0 or higher indicates failure to comply with PCI standards.

A moderate vulnerability, which ranges from 0.0 to 3.4 on the CVSS system can only be exploited locally and requires authentication. A successful attacker has little or no access to unrestricted information, cannot destroy or corrupt information, and cannot cause outages on any systems. Examples include default or guessable SNMP community names and the OpenSSL PRNG Internal State Discovery vulnerability.

A severe vulnerability, which ranges from 3.5 to 7.4 on the CVSS system, can be exploited with a moderate level of hacking experience and may or may not require authentication. A successful attacker has partial access to restricted information, can destroy some information, and can disable individual target systems on a network. Examples include Anonymous FTP Writeable and Weak LAN Manager hashing permitted.

A critical vulnerability, which ranges from 7.5 and 10.0 on the CVSS system, can be exploited with easy access and requires little or no authentication. A successful attacker has access to confidential information, can corrupt or delete data, and can cause a system outage. Examples include the ability of anonymous users can obtain a Windows password policy.

If CVSS scoring is the framework for a PCI audit result, why do I see "PCI" scores in my report?

Nexpose includes the legacy PCI scoring system as an additional way to rate and prioritize vulnerabilities. This system ranks vulnerabilities on a severity scale from 1 to 5. Any vulnerability ranking above 2 indicates failure to comply with PCI standards.

  • Level 5 vulnerabilities permit attacks with remote root or remote administrator capabilities that can compromise an entire host.
  • Level 4 vulnerabilities permit attacks with remote user capabilities and partial file system access.
  • Level 3 vulnerabilities permit access to specific stored information, such as security settings.
  • Level 2 vulnerabilities expose some sensitive host information, such as precise versions of services.
  • Level 1 vulnerabilities expose information such as open ports.
PCI, CVSS, & risk scoring FAQs (2024)
Top Articles
What is the awards season fashion trend that should define 2024?
The Most Popular Campbell's Soup, Ranked - StrawPoll
55Th And Kedzie Elite Staffing
Metallica - Blackened Lyrics Meaning
Craigslist Vans
Summit County Juvenile Court
Wellcare Dual Align 129 (HMO D-SNP) - Hearing Aid Benefits | FreeHearingTest.org
Usborne Links
Kansas Craigslist Free Stuff
1movierulzhd.fun Reviews | scam, legit or safe check | Scamadviser
Fototour verlassener Fliegerhorst Schönwald [Lost Place Brandenburg]
Ub Civil Engineering Flowsheet
Mail Healthcare Uiowa
Rainfall Map Oklahoma
Ukraine-Russia war: Latest updates
今月のSpotify Japanese Hip Hopベスト作品 -2024/08-|K.EG
735 Reeds Avenue 737 & 739 Reeds Ave., Red Bluff, CA 96080 - MLS# 20240686 | CENTURY 21
Does Breckie Hill Have An Only Fans – Repeat Replay
ARK: Survival Evolved Valguero Map Guide: Resource Locations, Bosses, & Dinos
CDL Rostermania 2023-2024 | News, Rumors & Every Confirmed Roster
Icivics The Electoral Process Answer Key
Sodium azide 1% in aqueous solution
Craigslist Northfield Vt
PCM.daily - Discussion Forum: Classique du Grand Duché
Koninklijk Theater Tuschinski
15 Primewire Alternatives for Viewing Free Streams (2024)
Amerisourcebergen Thoughtspot 2023
Mta Bus Forums
Masterbuilt Gravity Fan Not Working
Taylored Services Hardeeville Sc
Toonkor211
Bursar.okstate.edu
R3Vlimited Forum
Nextdoor Myvidster
Flixtor Nu Not Working
Forager How-to Get Archaeology Items - Dino Egg, Anchor, Fossil, Frozen Relic, Frozen Squid, Kapala, Lava Eel, and More!
Song That Goes Yeah Yeah Yeah Yeah Sounds Like Mgmt
Hannibal Mo Craigslist Pets
Geology - Grand Canyon National Park (U.S. National Park Service)
Kornerstone Funeral Tulia
2 Pm Cdt
Go Bananas Wareham Ma
The Angel Next Door Spoils Me Rotten Gogoanime
Ig Weekend Dow
Powerboat P1 Unveils 2024 P1 Offshore And Class 1 Race Calendar
60 Days From May 31
New Starfield Deep-Dive Reveals How Shattered Space DLC Will Finally Fix The Game's Biggest Combat Flaw
6463896344
Roller Znen ZN50QT-E
Strange World Showtimes Near Century Federal Way
Comenity/Banter
Kindlerso
Latest Posts
Article information

Author: Saturnina Altenwerth DVM

Last Updated:

Views: 5711

Rating: 4.3 / 5 (64 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Saturnina Altenwerth DVM

Birthday: 1992-08-21

Address: Apt. 237 662 Haag Mills, East Verenaport, MO 57071-5493

Phone: +331850833384

Job: District Real-Estate Architect

Hobby: Skateboarding, Taxidermy, Air sports, Painting, Knife making, Letterboxing, Inline skating

Introduction: My name is Saturnina Altenwerth DVM, I am a witty, perfect, combative, beautiful, determined, fancy, determined person who loves writing and wants to share my knowledge and understanding with you.