Company Details
federal-bank
12,365
704,473
52211
federalbank.co.in
0
FED_1338278
In-progress


Federal Bank Vendor Cyber Rating & Cyber Score
federalbank.co.inFederal Bank, one of the leading private sector banks with presence across the country, began its journey from humble backgrounds to reach the stature of an institution with national prominence & character. With a rich legacy of 7 decades, the Bank aspires to be the most admired Bank in the country and fueling its dreams are the 19 million and growing customer base who have always been loyal to the Bank as the Bank is to them. Headquartered in Aluva, Kerala, the Bank’s scrips are widely held and are listed in the Bombay Stock Exchange and National Stock Exchange in India. The Bank’s global depository receipts are listed on the London Stock Exchange. The Bank has built its empire on the twin values of ethics and excellence, and this has propelled the Bank throughout its journey. Over 1,588 branches, 2079+ ATMs/ Cash Recyclers and a committed, experienced & energetic workforce, Federal Bank now has its presence across the nation. To service the NRIs, who have been its pillars of strength, the Bank operates Representative Offices at Dubai and Abu Dhabi in the UAE. The Bank today handles one fifth of the total NR remittance to the country and this is testimony to its relationship with the NR diaspora. The Bank also has an IFSC Banking Unit (IBU) in Gujarat International Finance Tec-City (GIFT City). Transformation is inevitable and for Federal Bank it has been no different. The Bank believes in transforming itself, keeping its principles intact, to match the beats of the industry and the expectations of its stakeholders. Technology is the new buzzword, and it has left its indelible mark in the banking industry as well. Disclaimer: Federal Bank advices against sharing any confidential information on social media handles of the Bank
Company Details
federal-bank
12,365
704,473
52211
federalbank.co.in
0
FED_1338278
In-progress
Between 750 and 799

Federal Bank Global Score (TPRM)XXXX

Description: Critical VMware vCenter Vulnerability Added to CISA’s Exploited Flaws Catalog The Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2024-37079, a critical vulnerability in Broadcom’s VMware vCenter Server, to its Known Exploited Vulnerabilities (KEV) catalog after confirming active exploitation in the wild. The flaw, disclosed by Broadcom, is an out-of-bounds write issue in the DCERPC protocol implementation, allowing unauthenticated attackers with network access to execute remote code and potentially gain full control of affected systems. As the centralized management platform for VMware vSphere environments, a compromised vCenter Server could enable lateral movement across virtualized infrastructure, making this a high-risk threat for enterprises. The vulnerability (CWE-787) requires no user interaction, increasing its appeal to initial access brokers and ransomware groups, though CISA has not yet confirmed its use in ransomware campaigns. CISA’s addition of the flaw to the KEV catalog on January 23, 2026, mandates that Federal Civilian Executive Branch (FCEB) agencies remediate it by February 13, 2026. Broadcom has released patches, and organizations are advised to upgrade to the latest secure versions of vCenter Server. Additional mitigation measures include network segmentation to restrict vCenter access to trusted administrative networks, monitoring for anomalous DCERPC traffic, and auditing access logs for unauthorized attempts. With the remediation deadline approaching, enterprises must act swiftly to prevent exploitation by automated attack tools.


No incidents recorded for Federal Bank in 2026.
No incidents recorded for Federal Bank in 2026.
No incidents recorded for Federal Bank in 2026.
Federal Bank cyber incidents detection timeline including parent company and subsidiaries

Federal Bank, one of the leading private sector banks with presence across the country, began its journey from humble backgrounds to reach the stature of an institution with national prominence & character. With a rich legacy of 7 decades, the Bank aspires to be the most admired Bank in the country and fueling its dreams are the 19 million and growing customer base who have always been loyal to the Bank as the Bank is to them. Headquartered in Aluva, Kerala, the Bank’s scrips are widely held and are listed in the Bombay Stock Exchange and National Stock Exchange in India. The Bank’s global depository receipts are listed on the London Stock Exchange. The Bank has built its empire on the twin values of ethics and excellence, and this has propelled the Bank throughout its journey. Over 1,588 branches, 2079+ ATMs/ Cash Recyclers and a committed, experienced & energetic workforce, Federal Bank now has its presence across the nation. To service the NRIs, who have been its pillars of strength, the Bank operates Representative Offices at Dubai and Abu Dhabi in the UAE. The Bank today handles one fifth of the total NR remittance to the country and this is testimony to its relationship with the NR diaspora. The Bank also has an IFSC Banking Unit (IBU) in Gujarat International Finance Tec-City (GIFT City). Transformation is inevitable and for Federal Bank it has been no different. The Bank believes in transforming itself, keeping its principles intact, to match the beats of the industry and the expectations of its stakeholders. Technology is the new buzzword, and it has left its indelible mark in the banking industry as well. Disclaimer: Federal Bank advices against sharing any confidential information on social media handles of the Bank


CIMB Niaga was established as Bank Niaga in 1955. CIMB Group holds around 97.9% of the stakes in CIMB Niaga (including PT Commerce Kapital 1.02%). The Bank offers a comprehensive suite of both conventional and Islamic banking products and services, through an expanding delivery channel network of 91
FAB, the UAE’s largest bank and one of the world’s largest financial institutions offers a an extensive range of tailor-made solutions, and products and services, to provide a customised banking experience. Through its strategic offerings, it looks to meet the banking needs of customers across the w
Access Bank Plc is a full service commercial Bank operating through a network of over 600 branches and service outlets located in major centres across Nigeria, Sub Saharan Africa and the United Kingdom. Listed on the Nigerian Stock Exchange in 1998, the Bank serves its various markets through 5 busi
Established in 1985, ADCB places its focus on the UAE where it helps to make a significant contribution to the economy and community it serves. Our aspiration to be the number one bank of choice in the UAE is fueled by the strength and effectiveness of our strategy. Guided by our values of Integrity

La Banque Postale is a ‘bank like no other’ driven by the post office values of local presence and service. As heir to La Poste Financial Services, it is the only bank to have been tasked with a mission to provide access to banking services under the law introduced to modernise the French economy

HBL, Pakistan’s leading Bank, was the first commercial Bank to be established in Pakistan in 1947. Over the years, HBL has grown its branch network and maintained its position as the largest private sector Bank in Pakistan with over 1,728+ branches and 2,300+ ATMs globally, serving 37million+ client
Somos una Corporación líder y comprometida con el país que brinda servicios financieros de excelencia a cada segmento de clientes. Buscamos permanentemente ser el mejor Banco para ellos, ser el mejor lugar para trabajar y ser la mejor inversión para nuestros accionistas. Lo hacemos de forma colabora
About Emirates NBD Emirates NBD (DFM: Emirates NBD) is a leading banking group in the MENAT (Middle East, North Africa and Türkiye) region with a presence in 13 countries, serving over 20 million customers. As at 30th September 2023, total assets were AED 836 billion, (equivalent to approx. USD 22

BNP Paribas is a leading bank in Europe with an international reach. It has a presence in 64 countries, with more than 178,000 employees, including more than 144,000 in Europe. BNP Paribas holds leading positions in its three major operating divisions: ⚆ Commercial, Personal Banking & Services for
.png)
A near-collapse of the global software vulnerability database exposed critical weaknesses that could leave banks unable to track cyber...
FiCare Federal Credit Union said hackers breached an online banking platform that Fiserv provides and stole members' money.
NEW DELHI, Jan. 29, 2026 /PRNewswire/ -- The nationwide cybersecurity awareness movement 'Twice is Wise', a large-scale CSR initiative...
Federal Bank's nationwide cybersecurity awareness initiative, 'Twice is Wise', concluded in New Delhi, marking the culmination of a...
The U.K. conducted simulated cybersecurity attacks on its banks' live systems and found they lack basic patching and identity controls.
The National Institute of Standards and Technology's preliminary draft helps banks integrate artificial intelligence into their existing...
The U.S. federal government shutdown has slashed staff at the nation's cyber defense agency and other key cyber entities, freezing daily...
"Victims often suffer the loss of entire banking, savings, retirement, or investment accounts under the guise of 'protecting' their assets,"...
First launched in 2021, Twice is Wise is Federal Bank's flagship Corporate Social Responsibility (CSR) initiative in partnership with the Indian...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Federal Bank is http://www.federalbank.co.in.
According to Rankiteo, Federal Bank’s AI-generated cybersecurity score is 775, reflecting their Fair security posture.
According to Rankiteo, Federal Bank currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Federal Bank has been affected by a supply chain cyber incident involving VMware, with the incident ID VMWFED1769279335.
According to Rankiteo, Federal Bank is not certified under SOC 2 Type 1.
According to Rankiteo, Federal Bank does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Federal Bank is not listed as GDPR compliant.
According to Rankiteo, Federal Bank does not currently maintain PCI DSS compliance.
According to Rankiteo, Federal Bank is not compliant with HIPAA regulations.
According to Rankiteo,Federal Bank is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Federal Bank operates primarily in the Banking industry.
Federal Bank employs approximately 12,365 people worldwide.
Federal Bank presently has no subsidiaries across any sectors.
Federal Bank’s official LinkedIn profile has approximately 704,473 followers.
Federal Bank is classified under the NAICS code 52211, which corresponds to Commercial Banking.
Yes, Federal Bank has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/federal-bank-ltd.
Yes, Federal Bank maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/federal-bank.
As of April 02, 2026, Rankiteo reports that Federal Bank has experienced 1 cybersecurity incidents.
Federal Bank has an estimated 7,284 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability.
Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with network segmentation to restrict vcenter access to trusted administrative networks, and remediation measures with upgrade to the latest secure versions of vcenter server, and network segmentation with recommended, and enhanced monitoring with monitoring for anomalous dcerpc traffic, auditing access logs for unauthorized attempts..
Title: Critical VMware vCenter Vulnerability Added to CISA’s Exploited Flaws Catalog
Description: CISA has added CVE-2024-37079, a critical vulnerability in Broadcom’s VMware vCenter Server, to its Known Exploited Vulnerabilities (KEV) catalog after confirming active exploitation in the wild. The flaw is an out-of-bounds write issue in the DCERPC protocol implementation, allowing unauthenticated attackers with network access to execute remote code and potentially gain full control of affected systems. A compromised vCenter Server could enable lateral movement across virtualized infrastructure, posing a high-risk threat to enterprises.
Type: Remote Code Execution (RCE)
Attack Vector: Network access to vCenter Server via DCERPC protocol
Vulnerability Exploited: CVE-2024-37079 (CWE-787 - Out-of-bounds Write)
Motivation: Initial access for lateral movement, potential ransomware deployment
Common Attack Types: The most common types of attacks the company has faced is Vulnerability.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Unauthenticated network access to vCenter Server via DCERPC protocol.

Systems Affected: VMware vCenter Server, virtualized infrastructure
Operational Impact: Potential full control of virtualized environments, lateral movement

Entity Name: Broadcom (VMware)
Entity Type: Technology/Virtualization
Industry: Information Technology
Customers Affected: Enterprises using VMware vCenter Server

Containment Measures: Network segmentation to restrict vCenter access to trusted administrative networks
Remediation Measures: Upgrade to the latest secure versions of vCenter Server
Network Segmentation: Recommended
Enhanced Monitoring: Monitoring for anomalous DCERPC traffic, auditing access logs for unauthorized attempts
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Upgrade to the latest secure versions of vCenter Server.
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by network segmentation to restrict vcenter access to trusted administrative networks.

Regulatory Notifications: CISA KEV catalog addition mandates remediation for FCEB agencies by February 13, 2026

Recommendations: Upgrade to the latest secure versions of vCenter Server, implement network segmentation, monitor for anomalous DCERPC traffic, and audit access logs for unauthorized attempts.
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Upgrade to the latest secure versions of vCenter Server, implement network segmentation, monitor for anomalous DCERPC traffic and and audit access logs for unauthorized attempts..

Source: CISA Known Exploited Vulnerabilities Catalog
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: CISA Known Exploited Vulnerabilities Catalog.

Investigation Status: Active exploitation confirmed, remediation deadline set for FCEB agencies

Entry Point: Unauthenticated network access to vCenter Server via DCERPC protocol
High Value Targets: Virtualized infrastructure, enterprise environments
Data Sold on Dark Web: Virtualized infrastructure, enterprise environments

Root Causes: Out-of-bounds write vulnerability (CWE-787) in DCERPC protocol implementation
Corrective Actions: Patch management, network segmentation, enhanced monitoring
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Monitoring for anomalous DCERPC traffic, auditing access logs for unauthorized attempts.
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Patch management, network segmentation, enhanced monitoring.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Network segmentation to restrict vCenter access to trusted administrative networks.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Upgrade to the latest secure versions of vCenter Server, implement network segmentation, monitor for anomalous DCERPC traffic and and audit access logs for unauthorized attempts..
Most Recent Source: The most recent source of information about an incident is CISA Known Exploited Vulnerabilities Catalog.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Active exploitation confirmed, remediation deadline set for FCEB agencies.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Unauthenticated network access to vCenter Server via DCERPC protocol.
.png)
A vulnerability was found in Nothings stb up to 1.26. Impacted is the function stbtt_InitFont_internal in the library stb_truetype.h of the component TTF File Handler. Performing a manipulation results in out-of-bounds read. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read in VS6ComFile!get_macro_mem_COM. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain a stack-based buffer overflow in VS6ComFile!CSaveData::_conv_AnimationItem. Opening a crafted V7 file may lead to arbitrary code execution on the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6MemInIF!set_temp_type_default. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6ComFile!load_link_inf. Opening a crafted V7 file may lead to information disclosure from the affected product.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.