Badge
11,371 badges added since 01 January 2025
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions

Enedis est le gestionnaire du réseau public de distribution d’électricité sur 95 % du territoire français continental. Ses 38 859 collaborateurs assurent chaque jour l’exploitation, l’entretien et le développement de près de 1,3 million de kilomètres de réseau. Raccordement, mise en service, dépannage, changement de fournisseur... Autant d’opérations assurées quotidiennement par Enedis. En tant que gestionnaire du réseau public de distribution d’électricité, Enedis réalise chaque année de nombreuses interventions : plus de 11 millions en 2014. La nature des prestations diffère selon les clients : clients finaux, fournisseurs ou producteurs d’électricité.

Enedis A.I CyberSecurity Scoring

Enedis

Company Details

Linkedin ID:

enedis

Employees number:

23,409

Number of followers:

211,633

NAICS:

22

Industry Type:

Utilities

Homepage:

enedis.fr

IP Addresses:

0

Company ID:

ENE_2921647

Scan Status:

In-progress

AI scoreEnedis Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/enedis.jpeg
Enedis Utilities
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
Get a Score Increase
globalscoreEnedis Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/enedis.jpeg
Enedis Utilities
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Enedis Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

Enedis Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Enedis

Incidents vs Utilities Industry Average (This Year)

No incidents recorded for Enedis in 2026.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Enedis in 2026.

Incident Types Enedis vs Utilities Industry Avg (This Year)

No incidents recorded for Enedis in 2026.

Incident History — Enedis (X = Date, Y = Severity)

Enedis cyber incidents detection timeline including parent company and subsidiaries

Enedis Company Subsidiaries

SubsidiaryImage

Enedis est le gestionnaire du réseau public de distribution d’électricité sur 95 % du territoire français continental. Ses 38 859 collaborateurs assurent chaque jour l’exploitation, l’entretien et le développement de près de 1,3 million de kilomètres de réseau. Raccordement, mise en service, dépannage, changement de fournisseur... Autant d’opérations assurées quotidiennement par Enedis. En tant que gestionnaire du réseau public de distribution d’électricité, Enedis réalise chaque année de nombreuses interventions : plus de 11 millions en 2014. La nature des prestations diffère selon les clients : clients finaux, fournisseurs ou producteurs d’électricité.

Loading...
similarCompanies

Enedis Similar Companies

Pacific Gas and Electric Company

Pacific Gas and Electric Company, incorporated in California in 1905, is one of the largest combination natural gas and electric utilities in the United States. Based in San Francisco, the company is a subsidiary of PG&E Corporation. There are approximately 20,000 employees who carry out Pacific

Saudi Electricity Company

The Saudi Electricity Company was established on the 5th of April in the year 2000, incorporated in accordance with Council of Ministers Mandate No. 169 dated November 30th, 1998, the Saudi Electricity Company was born out of the merger of smaller regional power company in the central, eastern, west

Enel Group

We are a multinational company changing the face of energy, one of the world’s leading integrated utilities. As the largest private player in producing clean energy with renewable sources we have more than 92 GW of total capacity, including around 67 GW of renewables. Distributing electricity throu

National Grid

National Grid lies at the heart of a transforming energy system. Our business areas play a vital role in connecting millions of people to the energy they use, while continually seeking ways to make the energy system clean, fair, and affordable. In the UK we own and develop the high-voltage electri

NextEra Energy, Inc.

NextEra Energy, Inc. (NYSE: NEE) is one of the largest electric power and energy infrastructure companies in North America and is a leading provider of electricity to American homes and businesses. Headquartered in Juno Beach, Florida, NextEra Energy is a Fortune 200 company that owns Florida Power

PT PLN (Persero)

Indonesia State Electricity Corporation PLN has a long history in electricity industry of Indonesia. As the sole provider of electricity in Indonesia, PLN is striving to increase quality of services to all Indonesian. In 1972, in accordance with Government Regulation No.17, the State-owned Electric

Xunta de Galicia

A Xunta aparece definida no Estatuto de Autonomía, aprobado en 1981, como órgano colexiado do Goberno de Galicia. Na actualidade, a Xunta está composta polo presidente e dez conselleiros. A comunidade exerce as súas funcións administrativas a través da Xunta e dos seus entes e órganos dependentes.

Entergy

At Entergy (NYSE: ETR), we power life. More than 100 years ago, our founder Harvey Couch started this company with a handshake, some sawdust and a vision. Couch wanted to bring safe, affordable, reliable energy to the Middle South – energy that would power the lives of people and communities. Toda

NTPC Limited

NTPC Limited is India’s largest power generation utility with roots planted way back in 1975 to accelerate power development in India. Since then it has established itself as the dominant power major with a presence in the entire value chain of the power generation business. From fossil fuels, it ha

newsone

Enedis CyberSecurity News

February 06, 2026 08:00 AM
Fatoumata Sangare, OT Cybersecurity Officer

WP.6 regular meeting of ToS GRS, 11 February 2026. Img of Une image contenant Visage humain, personne... Speaker bio.

May 31, 2021 07:00 AM
Enedis becomes newest member of the European Network for Cyber Security (ENCS)

Enedis manages the public electricity distribution network for 95% of continental France including 1.4 million km of network, and more than...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Enedis CyberSecurity History Information

Official Website of Enedis

The official website of Enedis is https://www.enedis.fr/.

Enedis’s AI-Generated Cybersecurity Score

According to Rankiteo, Enedis’s AI-generated cybersecurity score is 784, reflecting their Fair security posture.

How many security badges does Enedis’ have ?

According to Rankiteo, Enedis currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Has Enedis been affected by any supply chain cyber incidents ?

According to Rankiteo, Enedis has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.

Does Enedis have SOC 2 Type 1 certification ?

According to Rankiteo, Enedis is not certified under SOC 2 Type 1.

Does Enedis have SOC 2 Type 2 certification ?

According to Rankiteo, Enedis does not hold a SOC 2 Type 2 certification.

Does Enedis comply with GDPR ?

According to Rankiteo, Enedis is not listed as GDPR compliant.

Does Enedis have PCI DSS certification ?

According to Rankiteo, Enedis does not currently maintain PCI DSS compliance.

Does Enedis comply with HIPAA ?

According to Rankiteo, Enedis is not compliant with HIPAA regulations.

Does Enedis have ISO 27001 certification ?

According to Rankiteo,Enedis is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Enedis

Enedis operates primarily in the Utilities industry.

Number of Employees at Enedis

Enedis employs approximately 23,409 people worldwide.

Subsidiaries Owned by Enedis

Enedis presently has no subsidiaries across any sectors.

Enedis’s LinkedIn Followers

Enedis’s official LinkedIn profile has approximately 211,633 followers.

NAICS Classification of Enedis

Enedis is classified under the NAICS code 22, which corresponds to Utilities.

Enedis’s Presence on Crunchbase

No, Enedis does not have a profile on Crunchbase.

Enedis’s Presence on LinkedIn

Yes, Enedis maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/enedis.

Cybersecurity Incidents Involving Enedis

As of April 01, 2026, Rankiteo reports that Enedis has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

Enedis has an estimated 4,343 peer or competitor companies worldwide.

Enedis CyberSecurity History Information

How many cyber incidents has Enedis faced ?

Total Incidents: According to Rankiteo, Enedis has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at Enedis ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

A security flaw has been discovered in itsourcecode Payroll Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /manage_user.php of the component Parameter Handler. Performing a manipulation of the argument ID results in sql injection. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in Axiomatic Bento4 up to 1.6.0-641. Affected is the function AP4_BitReader::SkipBits of the file Ap4Dac4Atom.cpp of the component DSI v1 Parser. Such manipulation of the argument n_presentations leads to heap-based buffer overflow. The attack needs to be performed locally. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.

Risk Information
cvss2
Base: 4.3
Severity: LOW
AV:L/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 4.8
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was determined in Axiomatic Bento4 up to 1.6.0-641. This impacts the function AP4_BitReader::ReadCache of the file Ap4Dac4Atom.cpp of the component MP4 File Parser. This manipulation causes heap-based buffer overflow. The attack needs to be launched locally. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.

Risk Information
cvss2
Base: 4.3
Severity: LOW
AV:L/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 4.8
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, there is a heap-buffer-overflow (HBO) in icAnsiToUtf8() in the XML conversion path. The issue is triggered by a crafted ICC profile which causes icAnsiToUtf8(std::string&, char const*) to treat an input buffer as a C-string and call operations that rely on strlen()/null-termination. AddressSanitizer reports an out-of-bounds READ of size 115 past a 114-byte heap allocation, with the failure observed while running the iccToXml tool. This issue has been patched in version 2.3.1.6.

Risk Information
cvss3
Base: 6.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, there is a stack-buffer-overflow (SBO) in CIccTagFixedNum<>::GetValues() and a related bug chain. The primary crash is an AddressSanitizer-reported WRITE of size 4 that overflows a 4-byte stack variable (rv) via the call chain CIccTagFixedNum::GetValues() -> CIccTagStruct::GetElemNumberValue(). This issue has been patched in version 2.3.1.6.

Risk Information
cvss3
Base: 6.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=enedis' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge