21 days ago
zerorisk run scan on railway IP for my PCI/DSS compliance but it failed with the following reason "Your firewall policy seems to let TCP packets with a specific source port pass through. Some types of requests can pass through the firewall. The port number listed in the results section of this vulnerability report is the source port that unauthorized users can use to bypass your firewall. The host responded 4 times to 4 TCP SYN probes sent to destination port 24567 using source port 53. However, it did not respond at all to 4 TCP SYN probes sent to the same destination port using a random source port."
zerorisk asking the following info "You will need to now go into that and update the failure with the correct response of either the vulnerability is 'N/A' and why that is. or that it is 'justified' and the evidence needs to be uploaded for that"
Can anyone tell me who this can be sort out ?
3 Replies
19 days ago
Status changed to Awaiting User Response railway[bot] • 19 days ago
19 days ago
Dear itsrems,
Thanks for update , document called "railway corporation SOC2 Type 16-11-24 ? which i have seen on trust railway ? This doc is ok to submit to zerorisk ?
Thanks
Status changed to Awaiting Railway Response railway[bot] • 19 days ago
Status changed to Awaiting User Response railway[bot] • 18 days ago
Status changed to Solved christian • 18 days ago