This report summarizes the findings from ACME's quarterly internal and external vulnerability scans conducted throughout calendar year 2024. These scans were performed using industry-recognized tools (e.g., Nessus, OpenVAS, Qualys) and focused on identifying vulnerabilities across the organization's systems, networks, endpoints, and cloud environments.
A total of four enterprise-wide scans and twelve targeted scans were conducted. The findings are consistent with national trends affecting small and medium-sized businesses (SMBs) and emphasize the importance of continuous patching, secure configurations, and user awareness.
| Category | % of Total Findings | Common CVEs Identified | Actions |
|---|---|---|---|
| Outdated Software / Unpatched OS | 26% | CVE-2023-21674, CVE-2024-0179 | |
| Misconfigured Web Servers | 21% | CVE-2024-23897 (Apache), CVE-2024-0347 | |
| Weak TLS/SSL Configurations | 16% | Use of deprecated ciphers, TLS 1.0/1.1 | |
| Missing Endpoint Protection Updates | 13% | AV signature failures, disabled agents | |
| Default Credentials / Open Ports | 11% | SSH/FTP open to public, weak password use |
ACME's vulnerability posture mirrors national patterns seen in other small and mid-sized contractors in 2024, notably:
ACME Technology Services Corporation has made measurable improvements in reducing its vulnerability surface in 2024. Continued commitment to cybersecurity hygiene and alignment with CMMC 2.0 Level 2 practices will help ensure resilience against emerging threats in 2025 and beyond.
This report demonstrates compliance with NIST SP 800-171 requirement RA.L2-3.11.2 (Vulnerability Scanning) and supports the organization's broader CMMC Level 2 certification efforts.