TCP Source Port Pass Firewall

flykonect
HOBBY

21 days ago

zerorisk run scan on railway IP for my PCI/DSS compliance but it failed with the following reason "Your firewall policy seems to let TCP packets with a specific source port pass through. Some types of requests can pass through the firewall. The port number listed in the results section of this vulnerability report is the source port that unauthorized users can use to bypass your firewall. The host responded 4 times to 4 TCP SYN probes sent to destination port 24567 using source port 53. However, it did not respond at all to 4 TCP SYN probes sent to the same destination port using a random source port."

zerorisk asking the following info "You will need to now go into that and update the failure with the correct response of either the vulnerability is 'N/A' and why that is. or that it is 'justified' and the evidence needs to be uploaded for that"

Can anyone tell me who this can be sort out ?

Solved

3 Replies

19 days ago

You can get our SOC2 and other compliance docs at https://trust.railway.com/

Best,

The Railway Team


Status changed to Awaiting User Response railway[bot] 19 days ago


flykonect
HOBBY

19 days ago

Dear itsrems,

Thanks for update , document called "railway corporation SOC2 Type 16-11-24 ? which i have seen on trust railway ? This doc is ok to submit to zerorisk ?

Thanks


Status changed to Awaiting Railway Response railway[bot] 19 days ago


Confirming you can submit the report to your auditors.


Status changed to Awaiting User Response railway[bot] 18 days ago


Status changed to Solved christian 18 days ago


TCP Source Port Pass Firewall - Railway Help Station