Badge
11,371 badges added since 01 January 2025
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions

Federal Bank, one of the leading private sector banks with presence across the country, began its journey from humble backgrounds to reach the stature of an institution with national prominence & character. With a rich legacy of 7 decades, the Bank aspires to be the most admired Bank in the country and fueling its dreams are the 19 million and growing customer base who have always been loyal to the Bank as the Bank is to them. Headquartered in Aluva, Kerala, the Bank’s scrips are widely held and are listed in the Bombay Stock Exchange and National Stock Exchange in India. The Bank’s global depository receipts are listed on the London Stock Exchange. The Bank has built its empire on the twin values of ethics and excellence, and this has propelled the Bank throughout its journey. Over 1,588 branches, 2079+ ATMs/ Cash Recyclers and a committed, experienced & energetic workforce, Federal Bank now has its presence across the nation. To service the NRIs, who have been its pillars of strength, the Bank operates Representative Offices at Dubai and Abu Dhabi in the UAE. The Bank today handles one fifth of the total NR remittance to the country and this is testimony to its relationship with the NR diaspora. The Bank also has an IFSC Banking Unit (IBU) in Gujarat International Finance Tec-City (GIFT City). Transformation is inevitable and for Federal Bank it has been no different. The Bank believes in transforming itself, keeping its principles intact, to match the beats of the industry and the expectations of its stakeholders. Technology is the new buzzword, and it has left its indelible mark in the banking industry as well. Disclaimer: Federal Bank advices against sharing any confidential information on social media handles of the Bank

Federal Bank A.I CyberSecurity Scoring

Federal Bank

Company Details

Linkedin ID:

federal-bank

Employees number:

12,365

Number of followers:

704,473

NAICS:

52211

Industry Type:

Banking

Homepage:

federalbank.co.in

IP Addresses:

0

Company ID:

FED_1338278

Scan Status:

In-progress

AI scoreFederal Bank Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/federal-bank.jpeg
Federal Bank Banking
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
Get a Score Increase
globalscoreFederal Bank Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/federal-bank.jpeg
Federal Bank Banking
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Federal Bank Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsSupply Chain SourceIncident DetailsView
Federal BankVulnerability10056/2024VMwareVMware
Rankiteo Explanation :
Attack threatening the organization's existence

Description: Critical VMware vCenter Vulnerability Added to CISA’s Exploited Flaws Catalog The Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2024-37079, a critical vulnerability in Broadcom’s VMware vCenter Server, to its Known Exploited Vulnerabilities (KEV) catalog after confirming active exploitation in the wild. The flaw, disclosed by Broadcom, is an out-of-bounds write issue in the DCERPC protocol implementation, allowing unauthenticated attackers with network access to execute remote code and potentially gain full control of affected systems. As the centralized management platform for VMware vSphere environments, a compromised vCenter Server could enable lateral movement across virtualized infrastructure, making this a high-risk threat for enterprises. The vulnerability (CWE-787) requires no user interaction, increasing its appeal to initial access brokers and ransomware groups, though CISA has not yet confirmed its use in ransomware campaigns. CISA’s addition of the flaw to the KEV catalog on January 23, 2026, mandates that Federal Civilian Executive Branch (FCEB) agencies remediate it by February 13, 2026. Broadcom has released patches, and organizations are advised to upgrade to the latest secure versions of vCenter Server. Additional mitigation measures include network segmentation to restrict vCenter access to trusted administrative networks, monitoring for anomalous DCERPC traffic, and auditing access logs for unauthorized attempts. With the remediation deadline approaching, enterprises must act swiftly to prevent exploitation by automated attack tools.

Broadcom and Federal Civilian Executive Branch: CISA Warns of Critical VMware vCenter RCE Vulnerability Now Exploited in Attacks
Vulnerability
Severity: 100
Impact: 5
Seen: 6/2024
Blog:
Supply Chain Source: VMwareVMware
Rankiteo Explanation
Attack threatening the organization's existence

Description: Critical VMware vCenter Vulnerability Added to CISA’s Exploited Flaws Catalog The Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2024-37079, a critical vulnerability in Broadcom’s VMware vCenter Server, to its Known Exploited Vulnerabilities (KEV) catalog after confirming active exploitation in the wild. The flaw, disclosed by Broadcom, is an out-of-bounds write issue in the DCERPC protocol implementation, allowing unauthenticated attackers with network access to execute remote code and potentially gain full control of affected systems. As the centralized management platform for VMware vSphere environments, a compromised vCenter Server could enable lateral movement across virtualized infrastructure, making this a high-risk threat for enterprises. The vulnerability (CWE-787) requires no user interaction, increasing its appeal to initial access brokers and ransomware groups, though CISA has not yet confirmed its use in ransomware campaigns. CISA’s addition of the flaw to the KEV catalog on January 23, 2026, mandates that Federal Civilian Executive Branch (FCEB) agencies remediate it by February 13, 2026. Broadcom has released patches, and organizations are advised to upgrade to the latest secure versions of vCenter Server. Additional mitigation measures include network segmentation to restrict vCenter access to trusted administrative networks, monitoring for anomalous DCERPC traffic, and auditing access logs for unauthorized attempts. With the remediation deadline approaching, enterprises must act swiftly to prevent exploitation by automated attack tools.

Ailogo

Federal Bank Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Federal Bank

Incidents vs Banking Industry Average (This Year)

No incidents recorded for Federal Bank in 2026.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Federal Bank in 2026.

Incident Types Federal Bank vs Banking Industry Avg (This Year)

No incidents recorded for Federal Bank in 2026.

Incident History — Federal Bank (X = Date, Y = Severity)

Federal Bank cyber incidents detection timeline including parent company and subsidiaries

Federal Bank Company Subsidiaries

SubsidiaryImage

Federal Bank, one of the leading private sector banks with presence across the country, began its journey from humble backgrounds to reach the stature of an institution with national prominence & character. With a rich legacy of 7 decades, the Bank aspires to be the most admired Bank in the country and fueling its dreams are the 19 million and growing customer base who have always been loyal to the Bank as the Bank is to them. Headquartered in Aluva, Kerala, the Bank’s scrips are widely held and are listed in the Bombay Stock Exchange and National Stock Exchange in India. The Bank’s global depository receipts are listed on the London Stock Exchange. The Bank has built its empire on the twin values of ethics and excellence, and this has propelled the Bank throughout its journey. Over 1,588 branches, 2079+ ATMs/ Cash Recyclers and a committed, experienced & energetic workforce, Federal Bank now has its presence across the nation. To service the NRIs, who have been its pillars of strength, the Bank operates Representative Offices at Dubai and Abu Dhabi in the UAE. The Bank today handles one fifth of the total NR remittance to the country and this is testimony to its relationship with the NR diaspora. The Bank also has an IFSC Banking Unit (IBU) in Gujarat International Finance Tec-City (GIFT City). Transformation is inevitable and for Federal Bank it has been no different. The Bank believes in transforming itself, keeping its principles intact, to match the beats of the industry and the expectations of its stakeholders. Technology is the new buzzword, and it has left its indelible mark in the banking industry as well. Disclaimer: Federal Bank advices against sharing any confidential information on social media handles of the Bank

Loading...
similarCompanies

Federal Bank Similar Companies

BNP Paribas Personal Finance

BNP Paribas Personal Finance is a major player in consumer credit in France and Europe, offering a wide range of consumer lending products. A 100% subsidiary of the BNP Paribas Group, the company provides, through its brands Cetelem, Findomestic, and Alpha Credit, a comprehensive range of personal l

PKO Bank Polski

We are the largest bank in Poland and one of the largest financial institutions in the region. Our strength rests on three strong pillars: the retail, the corporate and the investment segment. Irrespective of the unique nature of each of those areas, what joins them is the undivided attention they p

VakıfBank

1954 yılında, vakıf kaynaklarını ekonomik kalkınmanın gereksinimleri doğrultusunda en iyi biçimde değerlendirmek amacıyla kurulan VakıfBank, o günden bu yana çağdaş bankacılık yöntemleri ve uygulamalarıyla Türkiye’nin tasarruf düzeyinin gelişim sürecine katkıda bulunmaktadır. VakıfBank; bölgesinin e

Groupe BPCE

Groupe BPCE, at the service of its customers and the French economy Groupe BPCE pursues a full range of banking and insurance activities, working through its two major Banque Populaire and Caisse d’Epargne cooperative banking networks and through its different subsidiaries. Groupe BPCE, the 2n

Banco de Crédito BCP

Somos el banco peruano que desde hace más de 130 años viene liderando el sistema financiero a nivel nacional. A lo largo de todo este tiempo hemos contribuido con el desarrollo económico de nuestro país, transformando planes en realidad. Todo esto es posible gracias al equipo de profesionales de p

National Bank of Canada

At National Bank, we believe in the potential of each individual, and that even the smallest gestures can make a big difference. When we help others accomplish their projects, we help empower them and the community at large. We try to make a difference through innovation, but above all, by puttin

OCBC is the longest established Singapore bank, formed in 1932 from the merger of three local banks, the oldest of which was founded in 1912. It is now the second largest financial services group in Southeast Asia by assets and one of the world’s most highly-rated banks, with an Aa1 rating from Mood

Huntington National Bank

Welcome to Huntington. Huntington Bancshares Incorporated is a $210 billion asset regional bank holding company headquartered in Columbus, Ohio. Founded in 1866, The Huntington National Bank and its affiliates provide consumers, small and middle-market businesses, corporations, municipalities, and

Regions Bank

Regions Financial Corporation is a member of the S&P 500 Index and is one of the nation’s largest full-service providers of consumer and commercial banking, wealth management, and mortgage products and services. Regions serves customers across the South, Midwest and Texas, and through its subsidiary

newsone

Federal Bank CyberSecurity News

March 30, 2026 10:00 AM
A cyberdefense 'pillar' for banks faces 'existential crisis'

A near-collapse of the global software vulnerability database exposed critical weaknesses that could leave banks unable to track cyber...

February 02, 2026 08:00 AM
Florida credit union sues Fiserv, alleging lax cybersecurity

FiCare Federal Credit Union said hackers breached an online banking platform that Fiserv provides and stole members' money.

January 30, 2026 08:00 AM
Federal Banks Twice is Wise Cybersecurity Campaign Reaches Over 9 Crore Indians, Strengthening Indias Fight Against Cyber and Financial Fraud

NEW DELHI, Jan. 29, 2026 /PRNewswire/ -- The nationwide cybersecurity awareness movement 'Twice is Wise', a large-scale CSR initiative...

January 24, 2026 08:00 AM
Federal Bank’s ‘Twice is Wise’ campaign reaches over 9 crore Indians, boosts cybersecurity awareness nationwide

Federal Bank's nationwide cybersecurity awareness initiative, 'Twice is Wise', concluded in New Delhi, marking the culmination of a...

January 23, 2026 08:00 AM
UK cyber tests show banks' struggle with cybersecurity basics

The U.K. conducted simulated cybersecurity attacks on its banks' live systems and found they lack basic patching and identity controls.

December 17, 2025 08:00 AM
Banks get new federal guidance on AI cyber risks

The National Institute of Standards and Technology's preliminary draft helps banks integrate artificial intelligence into their existing...

October 01, 2025 07:00 AM
Shutdown Snares Federal Cybersecurity Personnel

The U.S. federal government shutdown has slashed staff at the nation's cyber defense agency and other key cyber entities, freezing daily...

August 30, 2025 07:00 AM
FBI, cybersecurity experts warn of 3-phase scam that is draining bank accounts

"Victims often suffer the loss of entire banking, savings, retirement, or investment accounts under the guise of 'protecting' their assets,"...

August 14, 2025 07:00 AM
Federal Bank rolls out catchy anthem in second phase of cybersecurity campaign

First launched in 2021, Twice is Wise is Federal Bank's flagship Corporate Social Responsibility (CSR) initiative in partnership with the Indian...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Federal Bank CyberSecurity History Information

Official Website of Federal Bank

The official website of Federal Bank is http://www.federalbank.co.in.

Federal Bank’s AI-Generated Cybersecurity Score

According to Rankiteo, Federal Bank’s AI-generated cybersecurity score is 775, reflecting their Fair security posture.

How many security badges does Federal Bank’ have ?

According to Rankiteo, Federal Bank currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Has Federal Bank been affected by any supply chain cyber incidents ?

According to Rankiteo, Federal Bank has been affected by a supply chain cyber incident involving VMware, with the incident ID VMWFED1769279335.

Does Federal Bank have SOC 2 Type 1 certification ?

According to Rankiteo, Federal Bank is not certified under SOC 2 Type 1.

Does Federal Bank have SOC 2 Type 2 certification ?

According to Rankiteo, Federal Bank does not hold a SOC 2 Type 2 certification.

Does Federal Bank comply with GDPR ?

According to Rankiteo, Federal Bank is not listed as GDPR compliant.

Does Federal Bank have PCI DSS certification ?

According to Rankiteo, Federal Bank does not currently maintain PCI DSS compliance.

Does Federal Bank comply with HIPAA ?

According to Rankiteo, Federal Bank is not compliant with HIPAA regulations.

Does Federal Bank have ISO 27001 certification ?

According to Rankiteo,Federal Bank is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Federal Bank

Federal Bank operates primarily in the Banking industry.

Number of Employees at Federal Bank

Federal Bank employs approximately 12,365 people worldwide.

Subsidiaries Owned by Federal Bank

Federal Bank presently has no subsidiaries across any sectors.

Federal Bank’s LinkedIn Followers

Federal Bank’s official LinkedIn profile has approximately 704,473 followers.

NAICS Classification of Federal Bank

Federal Bank is classified under the NAICS code 52211, which corresponds to Commercial Banking.

Federal Bank’s Presence on Crunchbase

Yes, Federal Bank has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/federal-bank-ltd.

Federal Bank’s Presence on LinkedIn

Yes, Federal Bank maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/federal-bank.

Cybersecurity Incidents Involving Federal Bank

As of April 02, 2026, Rankiteo reports that Federal Bank has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

Federal Bank has an estimated 7,284 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Federal Bank ?

Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability.

How does Federal Bank detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with network segmentation to restrict vcenter access to trusted administrative networks, and remediation measures with upgrade to the latest secure versions of vcenter server, and network segmentation with recommended, and enhanced monitoring with monitoring for anomalous dcerpc traffic, auditing access logs for unauthorized attempts..

Incident Details

Can you provide details on each incident ?

Incident : Remote Code Execution (RCE)

Title: Critical VMware vCenter Vulnerability Added to CISA’s Exploited Flaws Catalog

Description: CISA has added CVE-2024-37079, a critical vulnerability in Broadcom’s VMware vCenter Server, to its Known Exploited Vulnerabilities (KEV) catalog after confirming active exploitation in the wild. The flaw is an out-of-bounds write issue in the DCERPC protocol implementation, allowing unauthenticated attackers with network access to execute remote code and potentially gain full control of affected systems. A compromised vCenter Server could enable lateral movement across virtualized infrastructure, posing a high-risk threat to enterprises.

Type: Remote Code Execution (RCE)

Attack Vector: Network access to vCenter Server via DCERPC protocol

Vulnerability Exploited: CVE-2024-37079 (CWE-787 - Out-of-bounds Write)

Motivation: Initial access for lateral movement, potential ransomware deployment

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Vulnerability.

How does the company identify the attack vectors used in incidents ?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Unauthenticated network access to vCenter Server via DCERPC protocol.

Impact of the Incidents

What was the impact of each incident ?

Incident : Remote Code Execution (RCE) VMWFED1769279335

Systems Affected: VMware vCenter Server, virtualized infrastructure

Operational Impact: Potential full control of virtualized environments, lateral movement

Which entities were affected by each incident ?

Incident : Remote Code Execution (RCE) VMWFED1769279335

Entity Name: Broadcom (VMware)

Entity Type: Technology/Virtualization

Industry: Information Technology

Customers Affected: Enterprises using VMware vCenter Server

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Remote Code Execution (RCE) VMWFED1769279335

Containment Measures: Network segmentation to restrict vCenter access to trusted administrative networks

Remediation Measures: Upgrade to the latest secure versions of vCenter Server

Network Segmentation: Recommended

Enhanced Monitoring: Monitoring for anomalous DCERPC traffic, auditing access logs for unauthorized attempts

Data Breach Information

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Upgrade to the latest secure versions of vCenter Server.

How does the company handle incidents involving personally identifiable information (PII) ?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by network segmentation to restrict vcenter access to trusted administrative networks.

Regulatory Compliance

Were there any regulatory violations and fines imposed for each incident ?

Incident : Remote Code Execution (RCE) VMWFED1769279335

Regulatory Notifications: CISA KEV catalog addition mandates remediation for FCEB agencies by February 13, 2026

Lessons Learned and Recommendations

What recommendations were made to prevent future incidents ?

Incident : Remote Code Execution (RCE) VMWFED1769279335

Recommendations: Upgrade to the latest secure versions of vCenter Server, implement network segmentation, monitor for anomalous DCERPC traffic, and audit access logs for unauthorized attempts.

What recommendations has the company implemented to improve cybersecurity ?

Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Upgrade to the latest secure versions of vCenter Server, implement network segmentation, monitor for anomalous DCERPC traffic and and audit access logs for unauthorized attempts..

References

Where can I find more information about each incident ?

Incident : Remote Code Execution (RCE) VMWFED1769279335

Source: CISA Known Exploited Vulnerabilities Catalog

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: CISA Known Exploited Vulnerabilities Catalog.

Investigation Status

What is the current status of the investigation for each incident ?

Incident : Remote Code Execution (RCE) VMWFED1769279335

Investigation Status: Active exploitation confirmed, remediation deadline set for FCEB agencies

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : Remote Code Execution (RCE) VMWFED1769279335

Entry Point: Unauthenticated network access to vCenter Server via DCERPC protocol

High Value Targets: Virtualized infrastructure, enterprise environments

Data Sold on Dark Web: Virtualized infrastructure, enterprise environments

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : Remote Code Execution (RCE) VMWFED1769279335

Root Causes: Out-of-bounds write vulnerability (CWE-787) in DCERPC protocol implementation

Corrective Actions: Patch management, network segmentation, enhanced monitoring

What is the company's process for conducting post-incident analysis ?

Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Monitoring for anomalous DCERPC traffic, auditing access logs for unauthorized attempts.

What corrective actions has the company taken based on post-incident analysis ?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Patch management, network segmentation, enhanced monitoring.

Additional Questions

Impact of the Incidents

Response to the Incidents

What containment measures were taken in the most recent incident ?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Network segmentation to restrict vCenter access to trusted administrative networks.

Lessons Learned and Recommendations

What was the most significant recommendation implemented to improve cybersecurity ?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Upgrade to the latest secure versions of vCenter Server, implement network segmentation, monitor for anomalous DCERPC traffic and and audit access logs for unauthorized attempts..

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident is CISA Known Exploited Vulnerabilities Catalog.

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Active exploitation confirmed, remediation deadline set for FCEB agencies.

Initial Access Broker

What was the most recent entry point used by an initial access broker ?

Most Recent Entry Point: The most recent entry point used by an initial access broker was an Unauthenticated network access to vCenter Server via DCERPC protocol.

cve

Latest Global CVEs (Not Company-Specific)

Description

A vulnerability was found in Nothings stb up to 1.26. Impacted is the function stbtt_InitFont_internal in the library stb_truetype.h of the component TTF File Handler. Performing a manipulation results in out-of-bounds read. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:N/A:P
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read in VS6ComFile!get_macro_mem_COM. Opening a crafted V7 file may lead to information disclosure from the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain a stack-based buffer overflow in VS6ComFile!CSaveData::_conv_AnimationItem. Opening a crafted V7 file may lead to arbitrary code execution on the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6MemInIF!set_temp_type_default. Opening a crafted V7 file may lead to information disclosure from the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6ComFile!load_link_inf. Opening a crafted V7 file may lead to information disclosure from the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=federal-bank' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge