
Ericsson Company Cyber Security Posture
ericsson.comOur purpose To create connections that make the unimaginable possible. Our vision A world where limitless connectivity improves lives, redefines business and pioneers a sustainable future. Our values Perseverance, professionalism, respect and integrity. The future is a place for purpose & vision โ ours are clear, and we invite partners, customers and consumers to join us in our journey. For a brighter future. For all. Let's #ImaginePossible
Ericsson Company Details
ericsson
109927 employees
2098554.0
517
Telecommunications
ericsson.com
66
ERI_8911153
In-progress

Between 900 and 1000
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

Ericsson Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 900 and 1000 |
Ericsson Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
Ericsson | Vulnerability | 80 | 5 | 03/2022 | ERI1721322 | Link | |
Rankiteo Explanation : Attack threatening the organization's existenceDescription: A new bug was recently discovered in Ericsson Network Manager product by the TIM Red Team Research. The bug focuses on the CWE Exposure of Resource to Wrong Sphere and results in incorrect access-control behavior. Variuos security issues can be encountered of it gets exploited. |
Ericsson Company Subsidiaries

Our purpose To create connections that make the unimaginable possible. Our vision A world where limitless connectivity improves lives, redefines business and pioneers a sustainable future. Our values Perseverance, professionalism, respect and integrity. The future is a place for purpose & vision โ ours are clear, and we invite partners, customers and consumers to join us in our journey. For a brighter future. For all. Let's #ImaginePossible
Access Data Using Our API

Get company history
.png)
Ericsson Cyber Security News
POST Luxembourg Deploys Ericsson Security Manager to Strengthen Mobile Cybersecurity
Ericsson Security Manager is a purpose-built, automation-driven platform designed to provide holistic cyber defense for multi-vendor 5G mobileย ...
Edge AI: Ericsson and Supermicro Boost Speed and Security
Ericsson and Supermicro make strategic pledge with 5G-AI bundles to slash deployment time by 40% and strengthen cybersecurity for Edge AIย ...
OneLayer and Ericsson launch zero-trust security solution for private 5G networks
OneLayer and Ericsson introduce a Zero-Trust Network Access solution for private 5G networks, enhancing security with automation andย ...
Ericsson to deliver security automation and cyber defence for POST Luxembourg
Our cybersecurity platform Ericsson Security Manager empowers communication service providers like POST Luxembourg to address mobile networksย ...
Post Luxembourg selects Ericsson Security Manager for 5G cyber security
The ESM platform is designed to help telecom operators protect their infrastructure and data from cyber threats. Its capabilities includeย ...
Ericsson accelerates Ericom edge security integration into Cradlepoint
Ericsson is integrating Ericom assets into Cradlepoint, rebranding that firm's ZTEdge SSE product as NetCloud Threat Defense Cloud.
Telecom news: Ericsson, Telefonica cybersecurity breach, 5G spectrum auction in Serbia
Today's telecom news includes announcements on Ericsson India, Telefonica faces cybersecurity breach in Peru, 5G spectrum auction.
MWC24: How Ericsson Solutions are Securing 5G Networks
โOur aim is to secure the network end-to-end, meaning from core to radio, but also vertically in the full stack from operating system, cloud,ย ...
Ericsson Mobile Financial Services: Telco-Fintech Synergy Grows
Ella Guiladi of Ericsson Mobile Financial Services discusses the evolving landscape of digital finance & the promising future of telco-fintech partnerships.

Ericsson Similar Companies

Nokia
At Nokia, we create technology that helps the world act together. As a B2B technology innovation leader, we are pioneering the future where networks meet cloud to realize the full potential of digital in every industry. Through networks that sense, think and act, we work with our customers and pa

Jio
Make a new start. A start that will build beautiful relationships, shape millions of ideas. Enable a new way to live, learn, work and play. At Jio, we build products and services of the futureย to empower billions of Indians make their dreams a reality. Jio is about YOU. Join the movement to make I

Airtel Business
The B2B arm of Bharti Airtel, we are India's leading provider of secure and reliable connectivity, technology, and communications solutions. Our vast network spans across India, the US, Europe, Africa, the Middle East, Asia-Pacific, and SAARC, enabling us to serve businesses of all sizes and industr

Globe Telecom
Globe is a leading full-service telecommunications company in the Philippines and publicly listed in the PSE with the stock symbol GLO. The company serves the telecommunications and technology needs of consumers and businesses across an entire suite of products and services including mobile, fixed,

Bell
Bell is Canada's largest communications company providing advanced Bell broadband wireless, Internet, TV, media and business communications services. Founded in Montrรฉal in 1880, Bell is wholly owned by BCE Inc. To learn more, please visit Bell.ca or BCE.ca Through Bell for Better, we are investin

Iusacell
Con el constante avance tecnolรณgico en cuanto a movilidad y tecnologรญa, las telecomunicaciones y la comunicaciรณn son pieza fundamental para mover a una persona o a un paรญs entero, en Grupo Iusacell, a travรฉs de innovaciรณn, constancia, tecnologรญa y todos los empleados sintonizados en el mismo canal,

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
Ericsson CyberSecurity History Information
How many cyber incidents has Ericsson faced?
Total Incidents: According to Rankiteo, Ericsson has faced 1 incident in the past.
What types of cybersecurity incidents have occurred at Ericsson?
Incident Types: The types of cybersecurity incidents that have occurred incident Vulnerability.
Incident Details
Can you provide details on each incident?

Incident : Vulnerability
Title: Ericsson Network Manager Product Bug
Description: A new bug was recently discovered in Ericsson Network Manager product by the TIM Red Team Research. The bug focuses on the CWE Exposure of Resource to Wrong Sphere and results in incorrect access-control behavior. Various security issues can be encountered if it gets exploited.
Type: Vulnerability
Attack Vector: Exposure of Resource to Wrong Sphere
Vulnerability Exploited: CWE Exposure of Resource to Wrong Sphere
Threat Actor: TIM Red Team Research
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Vulnerability.
Impact of the Incidents
Which entities were affected by each incident?
Additional Questions
General Information
Who was the attacking group in the last incident?
Last Attacking Group: The attacking group in the last incident was an TIM Red Team Research.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
