kreiley
Aug 27, 2012

What CVSS Score is required for PCI compliance?

Does anyone know what CVSS (Common Vulnerability Scoring System) score is required to meet PCI DSS (Payment Card Industry Data Security Standards) compliance requirements?

b
billyaustintx_tw601266289
09/04/2012

I would agree with the answers provided for external scans.

 

For internal scans, it specifically states High vulnerabilities. We use bullet C as a baseline or remediating anything with a CVSS Score of 7 or higher.

 

NVD CVSS v2 Vulnerability Severity Ratings

http://nvd.nist.gov/cvss.cfm

 

A. Vulnerabilities are labeled "Low" severity if they have a CVSS base score of 0.0-3.9.

B. Vulnerabilities will be labeled "Medium" severity if they have a base CVSS score of 4.0-6.9.

C. Vulnerabilities will be labeled "High" severity if they have a CVSS base score of 7.0-10.0.

 

You can run a free internal PCI scan on a Macs or PC within a few seconds at www.iscanonline.com without registration or downloading software.

A
AppDevGuy
08/28/2012

 

You need to have a score from 0.0 through 3.9 to be compliant.  

 

From the PCI Security Standards Council: 

“To demonstrate compliance, a scan must not contain highlevel vulnerabilities in any 

component in the cardholder data environment. Generally, to be considered compliant, none of those components may contain any vulnerability that has been assigned a Common Vulnerability Scoring System (CVSS) base score equal to or higher than 4.0.”

 

Here is a quick reference guide (free pdf download) that you might find useful in the future:

https://www.pcisecuritystandards.org/documents/PCI%20SSC%20Quick%20Refer...

 

jimlynch
08/27/2012
See this:

http://www.qualys.com/enterprises/qualysguard/pci-compliance/pass-fail-c...

"Vulnerabilities with a NIST CVSS v2.0 base score of either 4.0 or higher will cause PCI compliance to fail on the scanned IPs.
Qualys will use the CVSSv2 score formula to calculate the severity and pass/fail status of any vulnerabilities that do not have a NIST-assigned CVSS score, or have a NIST CVSS score of 0.
An IP will be considered non-compliant if the SSL version installed on it is limited to 2.0 or older.
Vulnerabilities that may lead to SQL injection attacks and cross-site scripting will result in a non-compliant status on the corresponding IP.
Vulnerabilities or mis-configurations that may lead to denial of service are not taken into consideration for PCI compliance.
The PCI Technical Report will include a list of all vulnerabilities discovered, however the PCI vulnerabilities that drive the pass/fail criteria will be indicated as such.
A number of new items such as the presence of obsolete software or database services will also cause automatic failure."
Answer this