Ericsson Company Cyber Security Posture

ericsson.com

Our purpose To create connections that make the unimaginable possible. Our vision A world where limitless connectivity improves lives, redefines business and pioneers a sustainable future. Our values Perseverance, professionalism, respect and integrity. The future is a place for purpose & vision โ€“ ours are clear, and we invite partners, customers and consumers to join us in our journey. For a brighter future. For all. Let's #ImaginePossible

Ericsson Company Details

Linkedin ID:

ericsson

Employees number:

109927 employees

Number of followers:

2098554.0

NAICS:

517

Industry Type:

Telecommunications

Homepage:

ericsson.com

IP Addresses:

66

Company ID:

ERI_8911153

Scan Status:

In-progress

AI scoreEricsson Risk Score (AI oriented)

Between 900 and 1000

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

globalscoreEricsson Global Score
blurone
Ailogo

Ericsson Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 900 and 1000

Ericsson Company Cyber Security News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenUrl IDDetailsView
EricssonVulnerability80503/2022ERI1721322Link
Rankiteo Explanation :
Attack threatening the organization's existence

Description: A new bug was recently discovered in Ericsson Network Manager product by the TIM Red Team Research. The bug focuses on the CWE Exposure of Resource to Wrong Sphere and results in incorrect access-control behavior. Variuos security issues can be encountered of it gets exploited.

Ericsson Company Subsidiaries

SubsidiaryImage

Our purpose To create connections that make the unimaginable possible. Our vision A world where limitless connectivity improves lives, redefines business and pioneers a sustainable future. Our values Perseverance, professionalism, respect and integrity. The future is a place for purpose & vision โ€“ ours are clear, and we invite partners, customers and consumers to join us in our journey. For a brighter future. For all. Let's #ImaginePossible

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=ericsson' -H 'apikey: YOUR_API_KEY_HERE'
newsone

Ericsson Cyber Security News

2025-07-02T00:44:04.000Z
POST Luxembourg Deploys Ericsson Security Manager to Strengthen Mobile Cybersecurity

Ericsson Security Manager is a purpose-built, automation-driven platform designed to provide holistic cyber defense for multi-vendor 5G mobileย ...

2025-07-01T16:57:52.000Z
Edge AI: Ericsson and Supermicro Boost Speed and Security

Ericsson and Supermicro make strategic pledge with 5G-AI bundles to slash deployment time by 40% and strengthen cybersecurity for Edge AIย ...

2025-03-24T07:00:00.000Z
OneLayer and Ericsson launch zero-trust security solution for private 5G networks

OneLayer and Ericsson introduce a Zero-Trust Network Access solution for private 5G networks, enhancing security with automation andย ...

2025-06-30T12:49:10.000Z
Ericsson to deliver security automation and cyber defence for POST Luxembourg

Our cybersecurity platform Ericsson Security Manager empowers communication service providers like POST Luxembourg to address mobile networksย ...

2025-07-01T08:26:00.000Z
Post Luxembourg selects Ericsson Security Manager for 5G cyber security

The ESM platform is designed to help telecom operators protect their infrastructure and data from cyber threats. Its capabilities includeย ...

2025-05-04T09:41:50.000Z
Ericsson accelerates Ericom edge security integration into Cradlepoint

Ericsson is integrating Ericom assets into Cradlepoint, rebranding that firm's ZTEdge SSE product as NetCloud Threat Defense Cloud.

2025-06-04T07:00:00.000Z
Telecom news: Ericsson, Telefonica cybersecurity breach, 5G spectrum auction in Serbia

Today's telecom news includes announcements on Ericsson India, Telefonica faces cybersecurity breach in Peru, 5G spectrum auction.

2024-03-18T07:00:00.000Z
MWC24: How Ericsson Solutions are Securing 5G Networks

โ€œOur aim is to secure the network end-to-end, meaning from core to radio, but also vertically in the full stack from operating system, cloud,ย ...

2024-08-22T07:00:00.000Z
Ericsson Mobile Financial Services: Telco-Fintech Synergy Grows

Ella Guiladi of Ericsson Mobile Financial Services discusses the evolving landscape of digital finance & the promising future of telco-fintech partnerships.

similarCompanies

Ericsson Similar Companies

Nokia

At Nokia, we create technology that helps the world act together. As a B2B technology innovation leader, we are pioneering the future where networks meet cloud to realize the full potential of digital in every industry. Through networks that sense, think and act, we work with our customers and pa

Make a new start. A start that will build beautiful relationships, shape millions of ideas. Enable a new way to live, learn, work and play. At Jio, we build products and services of the futureย to empower billions of Indians make their dreams a reality. Jio is about YOU. Join the movement to make I

Airtel Business

The B2B arm of Bharti Airtel, we are India's leading provider of secure and reliable connectivity, technology, and communications solutions. Our vast network spans across India, the US, Europe, Africa, the Middle East, Asia-Pacific, and SAARC, enabling us to serve businesses of all sizes and industr

Globe Telecom

Globe is a leading full-service telecommunications company in the Philippines and publicly listed in the PSE with the stock symbol GLO. The company serves the telecommunications and technology needs of consumers and businesses across an entire suite of products and services including mobile, fixed,

Bell

Bell is Canada's largest communications company providing advanced Bell broadband wireless, Internet, TV, media and business communications services. Founded in Montrรฉal in 1880, Bell is wholly owned by BCE Inc. To learn more, please visit Bell.ca or BCE.ca Through Bell for Better, we are investin

Iusacell

Con el constante avance tecnolรณgico en cuanto a movilidad y tecnologรญa, las telecomunicaciones y la comunicaciรณn son pieza fundamental para mover a una persona o a un paรญs entero, en Grupo Iusacell, a travรฉs de innovaciรณn, constancia, tecnologรญa y todos los empleados sintonizados en el mismo canal,

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Ericsson CyberSecurity History Information

How many cyber incidents has Ericsson faced?

Total Incidents: According to Rankiteo, Ericsson has faced 1 incident in the past.

What types of cybersecurity incidents have occurred at Ericsson?

Incident Types: The types of cybersecurity incidents that have occurred incident Vulnerability.

Incident Details

Can you provide details on each incident?

Incident : Vulnerability

Title: Ericsson Network Manager Product Bug

Description: A new bug was recently discovered in Ericsson Network Manager product by the TIM Red Team Research. The bug focuses on the CWE Exposure of Resource to Wrong Sphere and results in incorrect access-control behavior. Various security issues can be encountered if it gets exploited.

Type: Vulnerability

Attack Vector: Exposure of Resource to Wrong Sphere

Vulnerability Exploited: CWE Exposure of Resource to Wrong Sphere

Threat Actor: TIM Red Team Research

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Vulnerability.

Impact of the Incidents

Which entities were affected by each incident?

Incident : Vulnerability ERI1721322

Entity Type: Corporation

Industry: Telecommunications

Additional Questions

General Information

Who was the attacking group in the last incident?

Last Attacking Group: The attacking group in the last incident was an TIM Red Team Research.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge