A PCI ASV (Approved Scanning Vendor) scan is a mandated quarterly external vulnerability assessment of all internet-facing components that could impact the security of the Cardholder Data Environment (CDE). Under PCI DSS 4.0.1, the scan checks for vulnerabilities with a CVSS score of 4.0 or higher, misconfigured firewalls, outdated software, and weak encryption (TLS 1.2+ is required).
Don't let a "Fail" report stall your business. Secusy ASV provides affordable, fast, and audit-ready reports that meet all PCI SSC requirements.
The scan targets all publicly accessible IP addresses and URLs. This includes:
As of 2026, the threshold for a "Fail" remains any vulnerability with a Common Vulnerability Scoring System (CVSS) base score of 4.0 or higher. This includes:
Secusy ASV scans specifically look for deprecated protocols. If you are still supporting TLS 1.0 or 1.1, the scan will return an automatic failure. You must demonstrate the use of TLS 1.2 or TLS 1.3 and strong cipher suites to protect data in transit.
| Category | Requirement | “Fail” Trigger |
|---|---|---|
CVSS Score | Must be < 4.0 | Any score $\ge$ 4.0 |
TLS Version | 1.2 or 1.3 | Use of TLS 1.0, 1.1, or SSL |
Default Passwords | Changed for all services | Any “factory-default” login detected |
Encryption | Strong Ciphers (AES-256+) | Use of DES, 3DES, or RC4 |
Unnecessary Services | Disabled | Open FTP, Telnet, or RDP |
Most legacy ASVs overwhelm SMBs with “False Positives”;vulnerabilities that aren’t actually risks but still cause a “Fail.” Secusy ASV uses refined detection logic to reduce noise. Our platform is built for speed, allowing you to run a scan, identify the 4.0+ CVSS failures, remediate, and rescan without waiting days for “support tickets” or manual reviews.
Stop overpaying for complex enterprise tools. Get the technical precision you need with the human clarity you want.
Subscribe now to keep reading and get access to the full archive.