POS System Audit Checklist with Vulnerability Priority Assessment (CVSS v3.1)

Professor

Professional
Messages
688
Reaction score
736
Points
93
Below is an updated version of the POS system audit checklist with the addition of a vulnerability priority assessment according to the CVSS (Common Vulnerability Scoring System) v3.1 scale.

Each critical vulnerability is provided with:
  • CVSS score (0.0–10.0),
  • Risk level (Low / Medium / High / Critical),
  • Brief rationale for the vector-based assessment (AV, AC, PR, UI, S, C, I, A).

CVSS v3.1 is a standard vulnerability severity rating system used in NVD, CVE, and cybersecurity reports.

POS System Audit Checklist with Vulnerability Priority Assessment (CVSS v3.1)​

1. Physical security of terminals​

CHECKNOT REALLYCVSSRISK LEVELCOMMENTS / RATIONALE
1.1Are there any signs of physical interference (chips, play)?7.5 (AV:L, AC:H, PR:N, UI:N, S:U, C:H, I:H, A:H)HighDirect access to the device may result in removal of keys or installation of a skimmer.
1.2Are anti-tamper sensors installed?Absence - increases risk (CVSS ~6.5) if physical access is present.
1.3Are skimmers inspected regularly?8.1 (AV:P, AC:L, PR:N, UI:N, S:U, C:H, I:H, A:H)HighLack of control allows the skimmer to remain present for long periods of time.
1.4Is access for engineers limited?6.3 (AV:A, AC:L, PR:L, UI:N, S:U, C:H, I:L, A:L)AverageUncontrolled access by third parties is a vector for infection.

2. Network security​

CHECKNOT REALLYCVSSRISK LEVELCOMMENTS / RATIONALE
2.1POS in the same VLAN with the office network?8.6 (AV:N, AC:L, PR:N, UI:N, S:U, C:H, I:H, A:H)CriticalAllows the attack to move from a compromised PC to the POS.
2.2Open ports: 21 (FTP), 23 (Telnet), 3389 (RDP)?9.8 (AV:N, AC:L, PR:N, UI:N, S:U, C:H, I:H, A:H)CriticalOpen services without encryption are a direct path to compromise.
2.3Is TLS 1.0/1.1 used?7.4 (AV:N, AC:L, PR:N, UI:N, S:U, C:H, I:N, A:N)HighLegacy encryption is vulnerable to MITM (POODLE, BEAST).
2.4No certificate pinning?8.1 (AV:N, AC:H, PR:N, UI:N, S:U, C:H, I:H, A:H)HighAllows MITM attacks on traffic to processing.
2.5Are you using Wi-Fi without encryption or WPA2-Personal?8.8 (AV:A, AC:L, PR:N, UI:N, S:U, C:H, I:H, A:H)CriticalEasy access to traffic within range.

3. Software and firmware​

CHECKNOT REALLYCVSSRISK LEVELCOMMENTS / RATIONALE
3.1Does your device use EOL firmware (e.g. Windows XP Embedded)?9.8 (AV:N, AC:L, PR:N, UI:N, S:U, C:H, I:H, A:H)CriticalNo updates, known exploits (eg EternalBlue).
3.2Malware detected (eg BlackPOS)?10.0 (AV:N, AC:L, PR:N, UI:N, S:C, C:H, I:H, A:H)CriticalDirect access to PAN in memory.
3.3Hardcode keys in firmware or software?9.1 (AV:N, AC:L, PR:N, UI:N, S:U, C:H, I:H, A:N)CriticalAn attacker can extract keys and forge transactions.
3.4No firmware digital signature verification?8.1 (AV:L, AC:L, PR:N, UI:N, S:U, C:H, I:H, A:H)HighIt is possible to install modified firmware.

4. Processing and storing card data​

CHECKNOT REALLYCVSSRISK LEVELCOMMENTS / RATIONALE
4.1Is the full PAN stored in the database or logs?10.0 (AV:N, AC:L, PR:N, UI:N, S:C, C:H, I:H, A:H)CriticalDirect violation of PCI DSS, massive data leak.
4.2Is magnetic stripe data (track data) stored?10.0 (AV:N, AC:L, PR:N, UI:N, S:C, C:H, I:H, A:H)CriticalProhibited by PCI DSS, allows card cloning.
4.3Нет P2PE (Point-to-Point Encryption)?9.0 (AV:N, AC:L, PR:N, UI:N, S:U, C:H, I:H, A:H)CriticalData is transmitted in clear text between the PC and the terminal.
4.4Is weak encryption used (DES instead of AES)?7.4 (AV:N, AC:L, PR:N, UI:N, S:U, C:H, I:N, A:N)HighPossibility of data decryption.

5. Authentication and access control​

CHECKNOT REALLYCVSSRISK LEVELCOMMENTS / RATIONALE
5.1Are the default passwords used (admin/1234)?8.8 (AV:A, AC:L, PR:N, UI:N, S:U, C:H, I:H, A:H)CriticalEasy brute force, full control over the terminal.
5.2No MFA for administrative access?7.1 (AV:N, AC:L, PR:L, UI:N, S:U, C:H, I:H, A:H)HighMakes it easier to compromise an account.
5.3No logging of administrator actions?5.3 (AV:N, AC:L, PR:N, UI:N, S:U, C:L, I:L, A:L)AverageMakes it difficult to investigate incidents.

6. Architecture and system type​

CHECKNOT REALLYCVSSRISK LEVELCOMMENTS / RATIONALE
6.1Hybrid system (PC + terminal) without P2PE?9.0 (AV:N, AC:L, PR:N, UI:N, S:U, C:H, I:H, A:H)CriticalCard data is available on PC before encryption.
6.2mPOS on an unprotected smartphone (no MDM, encryption)?8.1 (AV:N, AC:L, PR:N, UI:N, S:U, C:H, I:H, A:H)HighThe device may be stolen or infected.

7. Processes and Policies​

CHECKNOT REALLYCVSSRISK LEVELCOMMENTS / RATIONALE
7.1No information security policy?6.5 (AV:P, AC:L, PR:N, UI:N, S:U, C:H, I:H, A:H)AverageThe lack of procedures increases the risk of human error.
7.2Are your staff not trained in basic safety?6.8 (AV:P, AC:L, PR:N, UI:R, S:U, C:H, I:M, A:L)AverageRisk of phishing, malware installation, data leakage.
7.3No pentests for over a year?7.5 (AV:N, AC:L, PR:N, UI:N, S:U, C:H, I:H, A:H)HighUnknown vulnerabilities can be exploited for a long time.

8. Compliance with standards​

CHECKNOT REALLYCVSSRISK LEVELCOMMENTS / RATIONALE
8.1No SAQ or ROC for PCI DSS?7.0 (AV:P, AC:L, PR:N, UI:N, S:U, C:H, I:H, A:H)HighRisk of fines, loss of trust, suspension of acquiring.
8.2The terminal is not PCI PTS certified?8.0 (AV:P, AC:L, PR:N, UI:N, S:U, C:H, I:H, A:H)HighThe device may not meet basic safety requirements.

CVSS Interpretation Table​

EVALUATIONRISK LEVELACTION
0.0 – 3.9ShortEliminate in a planned manner
4.0 – 6.9AverageFix within 90 days
7.0 – 8.9HighFix within 30 days
9.0 – 10.0CriticalEliminate immediately (within 7 days)

Prioritization Guidelines​

  1. Fix vulnerabilities with CVSS ≥ 9.0 first:
    • Open ports (RDP, Telnet).
    • Storing track data.
    • Lack of P2PE in hybrid systems.
  2. Then - CVSS 7.0–8.9:
    • Outdated encryption.
    • Standard passwords.
    • No network segmentation.
  3. As planned - CVSS < 7.0:
    • No MFA.
    • No staff training.

Appendix: Report Template​

You can use this checklist as a basis for creating a report, including:
  • Summary table by risk levels.
  • Recommendations for troubleshooting.
  • Correction deadlines.
  • Responsible persons.
 
Top