Badge
11,371 badges added since 01 January 2025
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions

Diebold Nixdorf automates, digitizes and transforms the way people bank and shop. Its integrated solutions connect digital and physical channels conveniently, securely and efficiently for millions of consumers every day. As an innovation partner for nearly all of the world's top 100 financial institutions and a majority of the top 25 global retailers, Diebold Nixdorf delivers unparalleled services and technology that power the daily operations and consumer experience of financial institutions and retailers around the world.

Diebold Nixdorf A.I CyberSecurity Scoring

Diebold Nixdorf

Company Details

Linkedin ID:

diebold

Employees number:

20,251

Number of followers:

344,147

NAICS:

5415

Industry Type:

IT Services and IT Consulting

Homepage:

DieboldNixdorf.com

IP Addresses:

0

Company ID:

DIE_1559874

Scan Status:

In-progress

AI scoreDiebold Nixdorf Risk Score (AI oriented)

Between 650 and 699

https://images.rankiteo.com/companyimages/diebold.jpeg
Diebold Nixdorf IT Services and IT Consulting
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
Get a Score Increase
globalscoreDiebold Nixdorf Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/diebold.jpeg
Diebold Nixdorf IT Services and IT Consulting
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Diebold Nixdorf Company CyberSecurity News & History

Past Incidents
3
Attack Types
3
EntityTypeSeverityImpactSeenBlog DetailsSupply Chain SourceIncident DetailsView
Diebold NixdorfRansomware10054/2025NA
Rankiteo Explanation :
Attack threatening the organization's existence

Description: Diebold Nixdorf Hit by ProLock Ransomware Attack in April Diebold Nixdorf, the largest ATM provider in the U.S. and a major global player with over a third of the worldwide market, confirmed a ransomware attack in April that disrupted its corporate operations. The company disclosed the incident this week, stating that customer networks remained unaffected and that the attack had been contained. Security researcher Brian Krebs reported that the attackers deployed ProLock ransomware, a successor to the PwndLocker kit. ProLock encrypts files by appending malicious executables, sometimes layering them to complicate recovery. Victims are directed to a Tor-based payment portal via a ransom note, with demands averaging 60 BTC (approximately $570,000) in early April. Diebold Nixdorf confirmed it did not pay the ransom. The company detected the infection in late April and stated that the malware’s spread had been halted. Leadership reportedly contacted customers directly to inform them of the breach and mitigation efforts. While ransomware attacks often promise decryption tools upon payment, many victims never receive them, leaving data permanently inaccessible.

Diebold NixdorfVulnerability10058/2024NA
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: Independent researcher Matt Burch disclosed vulnerabilities in Diebold Nixdorf's ATM security solution, Vynamic Security Suite (VSS), during the Defcon security conference. The findings showed potential for attackers to circumvent hard drive encryption and gain full control over the machines if the patches are not applied, posing significant risks of financial data breach and unauthorized cash withdrawals. The unencrypted Linux partition used in the dual-boot configuration of the ATMs exacerbated the issue, allowing the exploitation path. Although Diebold has patched the issues, Burch suggested that patches might not be consistently deployed across all ATMs.

Diebold NixdorfCyber Attack60205/2020NA
Rankiteo Explanation :
Attack limited on finance or reputation

Description: Diebold Nixdorf admitted a cyber attack on a service provider in a letter to customers, this provided optimization data for cash distribution to the ATMs. It is uncertain who was responsible for the attack on servers and other components at the data center utilized by the service provider Planfocus. Aside from not being impacted, neither customer data nor statistics data have been lost as of this writing, as far as is known. A service provider's data center, which houses the CCO systems, was the target of the attack. Only the attack, not the cash supply itself, could have put the optimization in jeopardy.

Diebold Nixdorf: Diebold Nixdorf’s corporate network hit by ransomware attack
Ransomware
Severity: 100
Impact: 5
Seen: 4/2025
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack threatening the organization's existence

Description: Diebold Nixdorf Hit by ProLock Ransomware Attack in April Diebold Nixdorf, the largest ATM provider in the U.S. and a major global player with over a third of the worldwide market, confirmed a ransomware attack in April that disrupted its corporate operations. The company disclosed the incident this week, stating that customer networks remained unaffected and that the attack had been contained. Security researcher Brian Krebs reported that the attackers deployed ProLock ransomware, a successor to the PwndLocker kit. ProLock encrypts files by appending malicious executables, sometimes layering them to complicate recovery. Victims are directed to a Tor-based payment portal via a ransom note, with demands averaging 60 BTC (approximately $570,000) in early April. Diebold Nixdorf confirmed it did not pay the ransom. The company detected the infection in late April and stated that the malware’s spread had been halted. Leadership reportedly contacted customers directly to inform them of the breach and mitigation efforts. While ransomware attacks often promise decryption tools upon payment, many victims never receive them, leaving data permanently inaccessible.

Diebold Nixdorf
Vulnerability
Severity: 100
Impact: 5
Seen: 8/2024
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack threatening the organization’s existence

Description: Independent researcher Matt Burch disclosed vulnerabilities in Diebold Nixdorf's ATM security solution, Vynamic Security Suite (VSS), during the Defcon security conference. The findings showed potential for attackers to circumvent hard drive encryption and gain full control over the machines if the patches are not applied, posing significant risks of financial data breach and unauthorized cash withdrawals. The unencrypted Linux partition used in the dual-boot configuration of the ATMs exacerbated the issue, allowing the exploitation path. Although Diebold has patched the issues, Burch suggested that patches might not be consistently deployed across all ATMs.

Diebold Nixdorf
Cyber Attack
Severity: 60
Impact: 2
Seen: 05/2020
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack limited on finance or reputation

Description: Diebold Nixdorf admitted a cyber attack on a service provider in a letter to customers, this provided optimization data for cash distribution to the ATMs. It is uncertain who was responsible for the attack on servers and other components at the data center utilized by the service provider Planfocus. Aside from not being impacted, neither customer data nor statistics data have been lost as of this writing, as far as is known. A service provider's data center, which houses the CCO systems, was the target of the attack. Only the attack, not the cash supply itself, could have put the optimization in jeopardy.

Ailogo

Diebold Nixdorf Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Diebold Nixdorf

Incidents vs IT Services and IT Consulting Industry Average (This Year)

No incidents recorded for Diebold Nixdorf in 2026.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Diebold Nixdorf in 2026.

Incident Types Diebold Nixdorf vs IT Services and IT Consulting Industry Avg (This Year)

No incidents recorded for Diebold Nixdorf in 2026.

Incident History — Diebold Nixdorf (X = Date, Y = Severity)

Diebold Nixdorf cyber incidents detection timeline including parent company and subsidiaries

Diebold Nixdorf Company Subsidiaries

SubsidiaryImage

Diebold Nixdorf automates, digitizes and transforms the way people bank and shop. Its integrated solutions connect digital and physical channels conveniently, securely and efficiently for millions of consumers every day. As an innovation partner for nearly all of the world's top 100 financial institutions and a majority of the top 25 global retailers, Diebold Nixdorf delivers unparalleled services and technology that power the daily operations and consumer experience of financial institutions and retailers around the world.

Loading...
similarCompanies

Diebold Nixdorf Similar Companies

Samsung SDS

Samsung SDS provides cloud computing and digital logistics services. We build an optimized cloud environment with Samsung Cloud Platform specialized for businesses, provide all-in-one management service based on 38 years of expertise in each industry, and boost work efficiency and customer service w

HCLTech

HCLTech is a global technology company, home to more than 226,300 people across 60 countries, delivering industry-leading capabilities centered around AI, digital, engineering, cloud and software, powered by a broad portfolio of technology services and products. We work with clients across all major

Algar Tech

Somos a Algar Tech CX. Com 26 anos de mercado, atuamos como parceira de negócio para a transformação digital de grandes corporações. Nosso portfólio possui serviços de Relacionamento com o Cliente, que visam melhorar a experiência dos consumidores. Somos mais de 7 mil associados que trabalham com o

Akkodis

Akkodis is a global digital engineering company and Smart Industry leader. We enable clients to advance in their digital transformation with Talent, Academy, Consulting, and Solutions services. Our 50,000 experts combine best-in-class technologies, R&D, and deep sector know-how for purposeful innova

Zensar Technologies

Zensar stands out as a premier technology consulting and services company, embracing an ‘experience-led everything’ philosophy. We are creators, thinkers, and problem solvers passionate about designing digital experiences that are engineered into scale-ready products, services, and solutions to deli

Atos Group is a global leader in digital transformation with c. 67,000 employees and annual revenue of c. €10 billion, operating in 61 countries under two brands — Atos for services and Eviden for products. European number one in cybersecurity, cloud and high performance computing, Atos Group is com

CACI International Inc

At CACI International Inc (NYSE: CACI), our 25,000 talented and dynamic employees are ever vigilant in delivering distinctive expertise and technology to meet our customers’ greatest challenges in national security. We are a company of good character, relentless innovation, and long-standing excelle

NTT DATA Business Solutions

We understand the business of our clients and know what it takes to transform it into the future. At NTT DATA Business Solutions, we drive innovation – from advisory and implementation to managed services and beyond. With SAP at our core and a powerful ecosystem of partners, we continuously improve

Lenovo

Lenovo is a US$69 billion revenue global technology powerhouse, ranked #196 in the Fortune Global 500, and serving millions of customers every day in 180 markets. Focused on a bold vision to deliver Smarter Technology for All, Lenovo has built on its success as the world’s largest PC company with a

newsone

Diebold Nixdorf CyberSecurity News

March 18, 2026 03:31 AM
Q4 Rundown: Xerox (NASDAQ:XRX) Vs Other Hardware & Infrastructure Stocks

The end of an earnings season can be a great time to discover new stocks and assess how companies are handling the current business...

February 25, 2026 05:00 AM
Cybersecurity Threat Report 2025 by Diebold Nixdorf

The rise in malware-based jackpotting attacks in 2024 was unprecedented, and although the frequency in 2025 has moderated, it remains higher...

December 29, 2025 08:00 AM
54 people indicted in ATM jackpotting scheme in Nebraska

A grand jury in Nebraska has indicted 54 people for allegedly participating in an ATM jackpotting scheme.

December 23, 2025 08:00 AM
Midwest banks targeted by $5.4M ATM jackpotting scheme

Fifty-four individuals tied to the Tren de Aragua gang face charges for using Ploutus malware to drain millions from community banks and...

December 23, 2025 08:00 AM
Hardware & Infrastructure Q3 Earnings: IonQ (NYSE:IONQ) Simply the Best

Wrapping up Q3 earnings, we look at the numbers and key takeaways for the hardware & infrastructure stocks, including IonQ NYSE:IONQ and its...

November 26, 2025 08:00 AM
Martin Bally Age, Net Worth, Biography & Career Rise

Discover Martin Bally's net worth, age, family details, and cybersecurity career milestones in this detailed biography, plus insights on his...

October 26, 2025 07:00 AM
Winners And Losers Of Q2: NetApp (NASDAQ:NTAP) Vs The Rest Of The Hardware & Infrastructure Stocks

Quarterly earnings results are a good time to check in on a company's progress, especially compared to its peers in the same sector.

October 23, 2025 07:00 AM
ATM cybersecurity: Staying on top of malware attacks

ATM malware continues to be one of the most persistent and costly challenges for financial institutions worldwide. Here's how to stay on top...

October 22, 2025 07:00 AM
Mitigate ATM Jackpotting Risk With Layered Security

ATM jackpotting drains machines of cash and raises reputational concerns. Crowe cybersecurity specialists offer proactive and mitigating...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Diebold Nixdorf CyberSecurity History Information

Official Website of Diebold Nixdorf

The official website of Diebold Nixdorf is http://DieboldNixdorf.com.

Diebold Nixdorf’s AI-Generated Cybersecurity Score

According to Rankiteo, Diebold Nixdorf’s AI-generated cybersecurity score is 672, reflecting their Weak security posture.

How many security badges does Diebold Nixdorf’ have ?

According to Rankiteo, Diebold Nixdorf currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Has Diebold Nixdorf been affected by any supply chain cyber incidents ?

According to Rankiteo, Diebold Nixdorf has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.

Does Diebold Nixdorf have SOC 2 Type 1 certification ?

According to Rankiteo, Diebold Nixdorf is not certified under SOC 2 Type 1.

Does Diebold Nixdorf have SOC 2 Type 2 certification ?

According to Rankiteo, Diebold Nixdorf does not hold a SOC 2 Type 2 certification.

Does Diebold Nixdorf comply with GDPR ?

According to Rankiteo, Diebold Nixdorf is not listed as GDPR compliant.

Does Diebold Nixdorf have PCI DSS certification ?

According to Rankiteo, Diebold Nixdorf does not currently maintain PCI DSS compliance.

Does Diebold Nixdorf comply with HIPAA ?

According to Rankiteo, Diebold Nixdorf is not compliant with HIPAA regulations.

Does Diebold Nixdorf have ISO 27001 certification ?

According to Rankiteo,Diebold Nixdorf is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Diebold Nixdorf

Diebold Nixdorf operates primarily in the IT Services and IT Consulting industry.

Number of Employees at Diebold Nixdorf

Diebold Nixdorf employs approximately 20,251 people worldwide.

Subsidiaries Owned by Diebold Nixdorf

Diebold Nixdorf presently has no subsidiaries across any sectors.

Diebold Nixdorf’s LinkedIn Followers

Diebold Nixdorf’s official LinkedIn profile has approximately 344,147 followers.

NAICS Classification of Diebold Nixdorf

Diebold Nixdorf is classified under the NAICS code 5415, which corresponds to Computer Systems Design and Related Services.

Diebold Nixdorf’s Presence on Crunchbase

Yes, Diebold Nixdorf has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/diebold-nixdorf.

Diebold Nixdorf’s Presence on LinkedIn

Yes, Diebold Nixdorf maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/diebold.

Cybersecurity Incidents Involving Diebold Nixdorf

As of March 28, 2026, Rankiteo reports that Diebold Nixdorf has experienced 3 cybersecurity incidents.

Number of Peer and Competitor Companies

Diebold Nixdorf has an estimated 39,816 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Diebold Nixdorf ?

Incident Types: The types of cybersecurity incidents that have occurred include Ransomware, Vulnerability and Cyber Attack.

How does Diebold Nixdorf detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an communication strategy with letter to customers, and remediation measures with patches applied, and containment measures with malware spread halted, and communication strategy with direct customer notifications..

Incident Details

Can you provide details on each incident ?

Incident : Cyber Attack

Title: Cyber Attack on Diebold Nixdorf's Service Provider

Description: Diebold Nixdorf admitted a cyber attack on a service provider in a letter to customers, which provided optimization data for cash distribution to ATMs. The attack targeted a service provider's data center, which houses the CCO systems. The attack did not compromise customer data or statistics data.

Type: Cyber Attack

Incident : Vulnerability Exploitation

Title: Vulnerabilities in Diebold Nixdorf ATM Security Suite

Description: Independent researcher Matt Burch disclosed vulnerabilities in Diebold Nixdorf's ATM security solution, Vynamic Security Suite (VSS), during the Defcon security conference. The findings showed potential for attackers to circumvent hard drive encryption and gain full control over the machines if the patches are not applied, posing significant risks of financial data breach and unauthorized cash withdrawals. The unencrypted Linux partition used in the dual-boot configuration of the ATMs exacerbated the issue, allowing the exploitation path. Although Diebold has patched the issues, Burch suggested that patches might not be consistently deployed across all ATMs.

Type: Vulnerability Exploitation

Attack Vector: Hard Drive Encryption Bypass

Vulnerability Exploited: Unencrypted Linux Partition in Dual-Boot Configuration

Motivation: Financial Data BreachUnauthorized Cash Withdrawals

Incident : Ransomware

Title: Diebold Nixdorf Hit by ProLock Ransomware Attack

Description: Diebold Nixdorf, the largest ATM provider in the U.S. and a major global player, confirmed a ransomware attack in April that disrupted its corporate operations. The attack was contained, and customer networks remained unaffected.

Date Detected: 2020-04-01

Date Publicly Disclosed: 2020-05-01

Type: Ransomware

Motivation: Financial gain

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Impact of the Incidents

What was the impact of each incident ?

Incident : Cyber Attack DIE84429723

Systems Affected: CCO systems

Incident : Vulnerability Exploitation DIE000081024

Data Compromised: Financial Data

Systems Affected: ATMs

Incident : Ransomware DIE1772015252

Systems Affected: Corporate operations

Operational Impact: Disruption of corporate operations

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Financial Data.

Which entities were affected by each incident ?

Incident : Cyber Attack DIE84429723

Entity Name: Diebold Nixdorf

Entity Type: Company

Industry: Financial Services

Incident : Cyber Attack DIE84429723

Entity Name: Planfocus

Entity Type: Service Provider

Industry: Technology

Incident : Vulnerability Exploitation DIE000081024

Entity Name: Diebold Nixdorf

Entity Type: Company

Industry: Financial Services

Incident : Ransomware DIE1772015252

Entity Name: Diebold Nixdorf

Entity Type: Corporation

Industry: Financial Services (ATM Provider)

Location: Global (Headquartered in the U.S.)

Size: Large (over a third of the worldwide ATM market)

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Cyber Attack DIE84429723

Communication Strategy: Letter to customers

Incident : Vulnerability Exploitation DIE000081024

Remediation Measures: Patches Applied

Incident : Ransomware DIE1772015252

Containment Measures: Malware spread halted

Communication Strategy: Direct customer notifications

Data Breach Information

What type of data was compromised in each breach ?

Incident : Vulnerability Exploitation DIE000081024

Type of Data Compromised: Financial Data

Data Encryption: Hard Drive Encryption

Incident : Ransomware DIE1772015252

Data Encryption: Files encrypted by ProLock ransomware

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Patches Applied.

How does the company handle incidents involving personally identifiable information (PII) ?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by malware spread halted.

Ransomware Information

Was ransomware involved in any of the incidents ?

Incident : Ransomware DIE1772015252

Ransom Demanded: 60 BTC (~$570,000)

Ransom Paid: No

Ransomware Strain: ProLock

Data Encryption: Yes

References

Where can I find more information about each incident ?

Incident : Cyber Attack DIE84429723

Source: Diebold Nixdorf

Incident : Vulnerability Exploitation DIE000081024

Source: Defcon Security Conference

Incident : Ransomware DIE1772015252

Source: Brian Krebs (Security Researcher)

Incident : Ransomware DIE1772015252

Source: Diebold Nixdorf Disclosure

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Diebold Nixdorf, and Source: Defcon Security Conference, and Source: Brian Krebs (Security Researcher), and Source: Diebold Nixdorf Disclosure.

Investigation Status

What is the current status of the investigation for each incident ?

Incident : Ransomware DIE1772015252

Investigation Status: Contained

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Letter To Customers and Direct customer notifications.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : Ransomware DIE1772015252

Customer Advisories: Direct customer notifications regarding the breach and mitigation efforts

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Direct customer notifications regarding the breach and mitigation efforts.

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : Vulnerability Exploitation DIE000081024

Root Causes: Unencrypted Linux Partition in Dual-Boot Configuration

Corrective Actions: Patches Applied

What corrective actions has the company taken based on post-incident analysis ?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Patches Applied.

Additional Questions

General Information

Has the company ever paid ransoms ?

Ransom Payment History: The company has Paid ransoms in the past.

What was the amount of the last ransom demanded ?

Last Ransom Demanded: The amount of the last ransom demanded was 60 BTC (~$570,000).

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2020-04-01.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2020-05-01.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident was Financial Data.

What was the most significant system affected in an incident ?

Most Significant System Affected: The most significant system affected in an incident was CCO systems and and .

Response to the Incidents

What containment measures were taken in the most recent incident ?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Malware spread halted.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Financial Data.

Ransomware Information

What was the highest ransom demanded in a ransomware incident ?

Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was 60 BTC (~$570,000).

What was the highest ransom paid in a ransomware incident ?

Highest Ransom Paid: The highest ransom paid in a ransomware incident was No.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident are Defcon Security Conference, Diebold Nixdorf, Diebold Nixdorf Disclosure and Brian Krebs (Security Researcher).

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Contained.

Stakeholder and Customer Advisories

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued was an Direct customer notifications regarding the breach and mitigation efforts.

cve

Latest Global CVEs (Not Company-Specific)

Description

A flaw has been found in Tenda AC5 15.03.06.47. This vulnerability affects the function formQuickIndex of the file /goform/QuickIndex of the component POST Request Handler. This manipulation of the argument PPPOEPassword causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been published and may be used.

Risk Information
cvss2
Base: 9.0
Severity: LOW
AV:N/AC:L/Au:S/C:C/I:C/A:C
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 7.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was detected in Tenda AC5 15.03.06.47. This affects the function fromAddressNat of the file /goform/addressNat of the component POST Request Handler. The manipulation of the argument page results in stack-based buffer overflow. The attack can be launched remotely. The exploit is now public and may be used.

Risk Information
cvss2
Base: 9.0
Severity: LOW
AV:N/AC:L/Au:S/C:C/I:C/A:C
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 7.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

In TigerVNC before 1.16.2, Image.cxx in x0vncserver allows other users to observe or manipulate the screen contents, or cause an application crash, because of incorrect permissions.

Risk Information
cvss3
Base: 8.5
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L
Description

Incus is a system container and virtual machine manager. Prior to version 6.23.0, instance template files can be used to cause arbitrary read or writes as root on the host server. Incus allows for pongo2 templates within instances which can be used at various times in the instance lifecycle to template files inside of the instance. This particular implementation of pongo2 within Incus allowed for file read/write but with the expectation that the pongo2 chroot feature would isolate all such access to the instance's filesystem. This was allowed such that a template could theoretically read a file and then generate a new version of said file. Unfortunately the chroot isolation mechanism is entirely skipped by pongo2 leading to easy access to the entire system's filesystem with root privileges. Version 6.23.0 patches the issue.

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Description

Incus is a system container and virtual machine manager. Prior to version 6.23.0, a specially crafted storage bucket backup can be used by an user with access to Incus' storage bucket feature to crash the Incus daemon. Repeated use of this attack can be used to keep the server offline causing a denial of service of the control plane API. This does not impact any running workload, existing containers and virtual machines will keep operating. Version 6.23.0 fixes the issue.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=diebold' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge