Sample Network Vulnerability Assessment Report: Sales@purplesec - Us
Sample Network Vulnerability Assessment Report: Sales@purplesec - Us
[email protected]
Table of Contents
1. Executive Summary ................................................................................................................................... 2
2. Scan Results .............................................................................................................................................. 2
3. Our Findings .............................................................................................................................................. 2
4. Risk Assessment ........................................................................................................................................ 2
Critical Severity Vulnerability .................................................................................................................... 2
High Severity Vulnerability........................................................................................................................ 3
Medium Severity Vulnerability ................................................................................................................. 3
Low Severity Vulnerability ........................................................................................................................ 3
5. Recommendations .................................................................................................................................... 3
Remediation .............................................................................................................................................. 4
1|Page
[email protected]
1. Executive Summary
The purpose of this vulnerability scan is to gather data on Windows and third-party software patch levels
on hosts in the SAMPLE-INC domain in the 00.00.00.0/01 subnet. Of the 300 hosts identified by SAMPLE-
INC, 100 systems were found to be active and were scanned.
2. Scan Results
The raw scan results will be provided upon delivery.
3. Our Findings
The results from the credentialed patch audit are listed below. It is important to note that not all
identified hosts were able to be scanned during this assessment – of the 300 hosts identified as belonging
to the SAMPLE-INC domain, only 100 were successfully scanned. In addition, some of the hosts that were
successfully scanned were not included in the host list provided.
4. Risk Assessment
This report identifies security risks that could have significant impact on mission-critical applications used
for day-to-day business operations.
2|Page
[email protected]
High Severity Vulnerability
171 were unique high severity vulnerabilities. High severity vulnerabilities are often harder to exploit and
may not provide the same access to affected systems.
3|Page
[email protected]
5. Recommendations
Recommendations in this report are based on the available findings from the credentialed patch audit.
Vulnerability scanning is only one tool to assess the security posture of a network. The results should not
be interpreted as definitive measurement of the security posture of the SAMPLE-INC network. Other
elements used to assess the current security posture would include policy review, a review of internal
security controls and procedures, or internal red teaming/penetration testing.
Remediation
Taking the following actions across all hosts will resolve 96% of the vulnerabilities on the network:
Mozilla Firefox < 65.0: Upgrade to Mozilla Firefox version 65.0 or later. 82 3
4|Page
[email protected]