SAMPLE REPORT - FOR DEMONSTRATION PURPOSES ONLY  |  Back to Zio Security
SAMPLE
Expert Security Testing
External Penetration Test
ACME Corporation

Report Date: February 4, 2026

Assessment Period: January 28 - February 3, 2026

Version: 1.0

Confidential

Table of Contents

1. Executive Summary3
2. Scope & Methodology4
3. Summary of Findings5
4. Detailed Findings6
5. Remediation Roadmap12
6. Conclusion & Next Steps13
Appendix A: Testing Tools14
Appendix B: NIST CSF Mapping15

1. Executive Summary

Bottom Line: ACME Corporation's external security posture has several areas requiring attention. We identified 8 vulnerabilities across your public-facing infrastructure, including 1 critical and 2 high-severity issues that should be addressed within the next 7 days.

The most significant risks involve a remote code execution vulnerability on your customer portal, employee credentials found in public data breaches, and an exposed administrative panel. These are exactly the types of weaknesses attackers look for when targeting organizations.

Good news: Your main website is properly configured with modern security headers, your DNS records show no signs of hijacking vulnerabilities, and your web application firewall is correctly blocking common attack patterns.

Findings at a Glance

1
Critical
2
High
3
Medium
2
Low

Key Recommendations

  1. Patch Apache Struts immediately - The remote code execution vulnerability on the customer portal is actively exploitable and should be remediated within 24-48 hours.
  2. Force password resets for exposed accounts - 3 employee credentials were found in breaches. Reset these immediately and enable MFA.
  3. Restrict administrative panel access - The publicly accessible admin panel increases the risk of brute-force and credential stuffing attacks.

2. Scope & Methodology

Scope

This assessment covered the external attack surface of ACME Corporation, including:

Testing Methodology

Our assessment followed industry-standard methodologies including OWASP, PTES, and NIST guidelines. Testing was conducted from an external perspective, simulating what an attacker could discover and exploit without internal access.

Assessment Area Description
Attack Surface Mapping Discovery of all public-facing assets, DNS records, subdomains, and exposed services
Vulnerability Testing Identification of known vulnerabilities in exposed services and applications
Email Security Analysis of SPF, DKIM, and DMARC configurations
SSL/TLS Analysis Certificate validation and cryptographic configuration review
Credential Exposure Search for breached credentials associated with the organization
DNS Security Zone configuration and DNS hijacking risk assessment

3. Summary of Findings

ID Finding Severity CVSS NIST CSF
ZIO-001 Remote Code Execution on Public Web Application Critical 9.8 PR.IP-1
ZIO-002 Outdated TLS Configuration on Customer Portal Medium 5.9 PR.DS-2
ZIO-003 Breached Employee Credentials Discovered High 7.4 PR.AC-1
ZIO-004 Exposed Administrative Panel High 7.5 PR.AC-3
ZIO-005 Missing Security Headers on Portal Medium 4.7 PR.IP-1
ZIO-006 SSL Certificate Expires in 21 Days Low 3.1 PR.DS-2
ZIO-007 Directory Listing Enabled on Dev Server Low 3.7 ID.AM-1
ZIO-008 Missing DMARC Policy on Email Domain Medium 4.3 DE.CM-1

Severity Definitions

Severity CVSS Range Description
Critical 9.0 - 10.0 Immediate exploitation likely; significant business impact. Remediate within 24-48 hours.
High 7.0 - 8.9 Exploitation probable; major impact. Remediate within 7 days.
Medium 4.0 - 6.9 Exploitation possible; moderate impact. Remediate within 30 days.
Low 0.1 - 3.9 Exploitation unlikely; minor impact. Remediate within 90 days.
Info 0.0 Informational finding; best practice recommendation.

4. Detailed Findings

Remote Code Execution on Public Web Application
ZIO-001
Critical
CVSS Score 9.8
CVSS Vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
NIST CSF PR.IP-1
Affected Asset portal.acme-corp.com
Description

We discovered a critical remote code execution vulnerability in the web application running on your customer portal. The application is running an outdated version of Apache Struts (2.3.x) that is vulnerable to CVE-2017-5638, allowing unauthenticated attackers to execute arbitrary commands on the server.

Business Impact

An attacker exploiting this vulnerability could:

  • Gain complete control of the web server
  • Access customer data stored in connected databases
  • Use the compromised server as a pivot point to attack internal systems
  • Install ransomware or other malware
  • Cause significant business disruption and reputational damage
Evidence

We confirmed remote code execution by injecting a command through the Content-Type header:

$ curl -s -H "Content-Type: %{(#_='multipart/form-data').(#dm=@ognl.OgnlContext@DEFAULT_MEMBER_ACCESS)...}" \ https://portal.acme-corp.com/ $ # Server response confirmed command execution: uid=33(www-data) gid=33(www-data) groups=33(www-data) $ hostname acme-portal-prod-01 $ cat /etc/os-release | head -2 NAME="Ubuntu" VERSION="18.04.6 LTS (Bionic Beaver)"

Note: Payload truncated for brevity. No data was accessed or modified during testing.

Remediation
  1. Immediately update Apache Struts to the latest version (2.5.x or newer)
  2. If immediate patching is not possible, implement WAF rules to block exploitation attempts
  3. Review server logs for signs of previous exploitation
  4. Consider a full security assessment of the application after patching
Outdated TLS Configuration on Customer Portal
ZIO-002
Medium
CVSS Score 5.9
CVSS Vector AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
NIST CSF PR.DS-2
Affected Asset portal.acme-corp.com
Description

The customer portal accepts connections using TLS 1.0 and TLS 1.1, which are outdated protocols with known security vulnerabilities. These protocols are deprecated and no longer considered secure for protecting sensitive data in transit.

Business Impact

Attackers on the same network as a customer (such as public WiFi) could potentially intercept and decrypt sensitive business data transmitted to/from the portal. This is a regulatory compliance concern for protecting sensitive data in transit.

Evidence
$ sslyze portal.acme-corp.com TLS 1.0: ENABLED (INSECURE) TLS 1.1: ENABLED (INSECURE) TLS 1.2: ENABLED TLS 1.3: ENABLED
Remediation
  1. Access your web server or load balancer configuration
  2. Disable TLS 1.0 and TLS 1.1 protocols
  3. Ensure TLS 1.2 and TLS 1.3 remain enabled
  4. Test with SSLLabs.com to verify changes
  5. Note: This may affect users on very old browsers (IE 10 and below)
Breached Employee Credentials Discovered
ZIO-003
High
CVSS Score 7.4
CVSS Vector AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
NIST CSF PR.AC-1
Affected Asset 3 employee accounts
Description

We found 3 employee email addresses from your organization in public data breach databases. These credentials were exposed in third-party breaches (not a breach of your systems) but pose a risk if employees reuse passwords across services.

Business Impact

If any of these employees use the same password for their work accounts, attackers could gain unauthorized access to your systems. This is especially concerning for organizations where such access could lead to sensitive data exposure.

Evidence
EmailBreach SourceDate
j.smith@acme-corp.comLinkedIn 20212021-06-22
m.johnson@acme-corp.comAdobe 20192019-10-15
r.davis@acme-corp.comDropbox 20162016-08-31

Note: Actual passwords not displayed for security.

Remediation
  1. Force immediate password reset for the 3 affected accounts
  2. Enable multi-factor authentication (MFA) on all accounts if not already enabled
  3. Remind employees not to reuse passwords across personal and work accounts
  4. Consider implementing a password manager for the organization
Exposed Administrative Panel
ZIO-004
High
CVSS Score 7.5
CVSS Vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
NIST CSF PR.AC-3
Affected Asset acme-corp.com/wp-admin
Description

The WordPress administrative panel is publicly accessible at a predictable URL (/wp-admin) with no IP restrictions or additional access controls. The login page is exposed to the internet, allowing any attacker to attempt authentication. Combined with the breached credentials identified in ZIO-003, this significantly increases the risk of unauthorized administrative access.

Business Impact

An attacker who gains administrative access to the WordPress panel could:

  • Modify website content, potentially defacing the site or injecting malicious code
  • Install backdoor plugins to maintain persistent access
  • Access sensitive configuration data including database credentials
  • Use the compromised server as a staging point for further attacks
Evidence
$ curl -s -o /dev/null -w "%{http_code}" https://acme-corp.com/wp-admin/ 302 $ curl -s -o /dev/null -w "%{http_code}" https://acme-corp.com/wp-login.php 200 WordPress admin login page is publicly accessible with no IP restrictions.
Remediation
  1. Restrict access to /wp-admin and /wp-login.php by IP address using server configuration or a firewall
  2. Install a WordPress security plugin (Wordfence, Sucuri) to add login protection
  3. Enable multi-factor authentication for all admin accounts
  4. Consider renaming or hiding the admin URL using a security plugin
Missing Security Headers on Portal
ZIO-005
Medium
CVSS Score 4.7
CVSS Vector AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
NIST CSF PR.IP-1
Affected Asset portal.acme-corp.com
Description

The customer portal is missing several recommended HTTP security headers that help protect users from various web-based attacks.

Evidence
HeaderStatusPurpose
Content-Security-PolicyMissingPrevents XSS attacks
X-Frame-OptionsMissingPrevents clickjacking
X-Content-Type-OptionsPresentPrevents MIME sniffing
Strict-Transport-SecurityMissingForces HTTPS
Remediation

Add the following headers to your web server configuration:

Content-Security-Policy: default-src 'self' X-Frame-Options: DENY Strict-Transport-Security: max-age=31536000; includeSubDomains
SSL Certificate Expires in 21 Days
ZIO-006
Low
CVSS Score 3.1
CVSS Vector AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
NIST CSF PR.DS-2
Affected Asset vpn.acme-corp.com
Description

The SSL certificate for your VPN portal expires on February 25, 2026. If not renewed, users will see security warnings and may be unable to connect.

Remediation

Renew the SSL certificate before expiration. Consider setting up auto-renewal with Let's Encrypt or configuring calendar reminders 30 days before future expirations.

Directory Listing Enabled on Dev Server
ZIO-007
Low
CVSS Score 3.7
CVSS Vector AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
NIST CSF ID.AM-1
Affected Asset dev.acme-corp.com
Description

A development server was discovered that allows directory listing. While no sensitive files were exposed, this server should not be publicly accessible.

Remediation

Restrict access to development servers using IP allowlisting or VPN requirements. Disable directory listing in the web server configuration.

Missing DMARC Policy on Email Domain
ZIO-008
Medium
CVSS Score 4.3
CVSS Vector AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
NIST CSF DE.CM-1
Affected Asset acme-corp.com (email domain)
Description

The acme-corp.com domain does not have a DMARC (Domain-based Message Authentication, Reporting and Conformance) policy configured. Without DMARC, attackers can send emails that appear to come from your domain, making phishing attacks against your customers and employees more convincing.

Business Impact

Without a DMARC policy, attackers can spoof emails from your domain to:

  • Send phishing emails to customers that appear to originate from your organization
  • Conduct business email compromise (BEC) attacks targeting employees or vendors
  • Damage brand reputation if spoofed emails are used for fraud or spam
Evidence
$ dig TXT _dmarc.acme-corp.com +short ;; No DMARC record found $ dig TXT acme-corp.com +short | grep spf "v=spf1 include:_spf.google.com ~all" SPF is configured but without DMARC enforcement, spoofed emails may still reach recipients.
Remediation
  1. Start with a monitoring-only DMARC policy: add a DNS TXT record for _dmarc.acme-corp.com with v=DMARC1; p=none; rua=mailto:dmarc-reports@acme-corp.com
  2. Monitor DMARC reports for 2-4 weeks to identify legitimate email sources
  3. Gradually tighten the policy from p=none to p=quarantine, then p=reject
  4. Ensure all legitimate email sources are covered by SPF and DKIM

5. Remediation Roadmap

The following roadmap prioritizes remediation efforts based on risk severity and implementation complexity. We recommend addressing issues in the order presented.

Priority Finding Effort Timeline
Immediate
24-48 hours
ZIO-001: Remote Code Execution Low Week 1
Immediate
24-48 hours
ZIO-003: Breached Credentials (force reset) Low Week 1
Short-term
1-7 days
ZIO-004: Exposed Admin Panel Medium Week 1-2
Medium-term
1-4 weeks
ZIO-002: Outdated TLS Configuration Low Week 2-3
Medium-term
1-4 weeks
ZIO-005: Missing Security Headers Medium Week 2-4
Medium-term
1-4 weeks
ZIO-008: Missing DMARC Policy Low Week 2-4
Short-term
1-7 days
ZIO-006: SSL Certificate Renewal Low Before Feb 25
Long-term
1-3 months
ZIO-007: Dev Server Access Low Month 2

Effort Definitions

6. Conclusion & Next Steps

This External Penetration Test identified 8 vulnerabilities in ACME Corporation's external attack surface. The most critical issues, the remote code execution vulnerability and breached credentials, should be addressed immediately and will significantly improve your security posture.

Recommended Next Steps

  1. Address critical findings this week - Patch the Apache Struts vulnerability and reset compromised passwords within the next 48 hours.
  2. Schedule TLS update - Coordinate with your IT team to disable old TLS protocols on the customer portal during a maintenance window.
  3. Complete remaining items - Use the roadmap above to work through medium and low priority items over the next 30-90 days.
  4. Verify fixes - After remediation, we'll re-test to confirm vulnerabilities are resolved (included in your engagement).
  5. Free retesting - We will retest remediated findings at no additional cost within 6 months.

Questions?

If you have questions about any findings or need help prioritizing remediation, contact us at support@ziosecurity.com.

Thank you for choosing Zio Security.

Appendix A: Testing Tools

The following tools were used during this assessment:

Tool Purpose
Nmap Port scanning and service enumeration
Nuclei Vulnerability scanning
SSLyze SSL/TLS configuration analysis
Subfinder / Amass Subdomain enumeration
Dehashed Credential breach search
MXToolbox Email security analysis
SecurityHeaders.com HTTP header analysis

Appendix B: NIST CSF Mapping

Findings in this report are mapped to the NIST Cybersecurity Framework (CSF) to support compliance and risk management efforts.

NIST CSF Control Description Related Findings
ID.AM-1 Physical devices and systems are inventoried ZIO-007
PR.AC-1 Identities and credentials are issued, managed, verified, revoked, and audited ZIO-003
PR.AC-3 Remote access is managed ZIO-004
PR.DS-2 Data-in-transit is protected ZIO-002, ZIO-006
DE.CM-1 The network is monitored to detect potential cybersecurity events ZIO-008
PR.IP-1 A baseline configuration of systems is created and maintained ZIO-001, ZIO-005