Company Details
federal-bank
12,365
704,473
52211
federalbank.co.in
0
FED_1338278
In-progress


Federal Bank Vendor Cyber Rating & Cyber Score
federalbank.co.inFederal Bank, one of the leading private sector banks with presence across the country, began its journey from humble backgrounds to reach the stature of an institution with national prominence & character. With a rich legacy of 7 decades, the Bank aspires to be the most admired Bank in the country and fueling its dreams are the 19 million and growing customer base who have always been loyal to the Bank as the Bank is to them. Headquartered in Aluva, Kerala, the Bank’s scrips are widely held and are listed in the Bombay Stock Exchange and National Stock Exchange in India. The Bank’s global depository receipts are listed on the London Stock Exchange. The Bank has built its empire on the twin values of ethics and excellence, and this has propelled the Bank throughout its journey. Over 1,588 branches, 2079+ ATMs/ Cash Recyclers and a committed, experienced & energetic workforce, Federal Bank now has its presence across the nation. To service the NRIs, who have been its pillars of strength, the Bank operates Representative Offices at Dubai and Abu Dhabi in the UAE. The Bank today handles one fifth of the total NR remittance to the country and this is testimony to its relationship with the NR diaspora. The Bank also has an IFSC Banking Unit (IBU) in Gujarat International Finance Tec-City (GIFT City). Transformation is inevitable and for Federal Bank it has been no different. The Bank believes in transforming itself, keeping its principles intact, to match the beats of the industry and the expectations of its stakeholders. Technology is the new buzzword, and it has left its indelible mark in the banking industry as well. Disclaimer: Federal Bank advices against sharing any confidential information on social media handles of the Bank
Company Details
federal-bank
12,365
704,473
52211
federalbank.co.in
0
FED_1338278
In-progress
Between 750 and 799

Federal Bank Global Score (TPRM)XXXX

Description: Critical VMware vCenter Vulnerability Added to CISA’s Exploited Flaws Catalog The Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2024-37079, a critical vulnerability in Broadcom’s VMware vCenter Server, to its Known Exploited Vulnerabilities (KEV) catalog after confirming active exploitation in the wild. The flaw, disclosed by Broadcom, is an out-of-bounds write issue in the DCERPC protocol implementation, allowing unauthenticated attackers with network access to execute remote code and potentially gain full control of affected systems. As the centralized management platform for VMware vSphere environments, a compromised vCenter Server could enable lateral movement across virtualized infrastructure, making this a high-risk threat for enterprises. The vulnerability (CWE-787) requires no user interaction, increasing its appeal to initial access brokers and ransomware groups, though CISA has not yet confirmed its use in ransomware campaigns. CISA’s addition of the flaw to the KEV catalog on January 23, 2026, mandates that Federal Civilian Executive Branch (FCEB) agencies remediate it by February 13, 2026. Broadcom has released patches, and organizations are advised to upgrade to the latest secure versions of vCenter Server. Additional mitigation measures include network segmentation to restrict vCenter access to trusted administrative networks, monitoring for anomalous DCERPC traffic, and auditing access logs for unauthorized attempts. With the remediation deadline approaching, enterprises must act swiftly to prevent exploitation by automated attack tools.


No incidents recorded for Federal Bank in 2026.
No incidents recorded for Federal Bank in 2026.
No incidents recorded for Federal Bank in 2026.
Federal Bank cyber incidents detection timeline including parent company and subsidiaries

Federal Bank, one of the leading private sector banks with presence across the country, began its journey from humble backgrounds to reach the stature of an institution with national prominence & character. With a rich legacy of 7 decades, the Bank aspires to be the most admired Bank in the country and fueling its dreams are the 19 million and growing customer base who have always been loyal to the Bank as the Bank is to them. Headquartered in Aluva, Kerala, the Bank’s scrips are widely held and are listed in the Bombay Stock Exchange and National Stock Exchange in India. The Bank’s global depository receipts are listed on the London Stock Exchange. The Bank has built its empire on the twin values of ethics and excellence, and this has propelled the Bank throughout its journey. Over 1,588 branches, 2079+ ATMs/ Cash Recyclers and a committed, experienced & energetic workforce, Federal Bank now has its presence across the nation. To service the NRIs, who have been its pillars of strength, the Bank operates Representative Offices at Dubai and Abu Dhabi in the UAE. The Bank today handles one fifth of the total NR remittance to the country and this is testimony to its relationship with the NR diaspora. The Bank also has an IFSC Banking Unit (IBU) in Gujarat International Finance Tec-City (GIFT City). Transformation is inevitable and for Federal Bank it has been no different. The Bank believes in transforming itself, keeping its principles intact, to match the beats of the industry and the expectations of its stakeholders. Technology is the new buzzword, and it has left its indelible mark in the banking industry as well. Disclaimer: Federal Bank advices against sharing any confidential information on social media handles of the Bank


BNP Paribas Personal Finance is a major player in consumer credit in France and Europe, offering a wide range of consumer lending products. A 100% subsidiary of the BNP Paribas Group, the company provides, through its brands Cetelem, Findomestic, and Alpha Credit, a comprehensive range of personal l
We are the largest bank in Poland and one of the largest financial institutions in the region. Our strength rests on three strong pillars: the retail, the corporate and the investment segment. Irrespective of the unique nature of each of those areas, what joins them is the undivided attention they p
1954 yılında, vakıf kaynaklarını ekonomik kalkınmanın gereksinimleri doğrultusunda en iyi biçimde değerlendirmek amacıyla kurulan VakıfBank, o günden bu yana çağdaş bankacılık yöntemleri ve uygulamalarıyla Türkiye’nin tasarruf düzeyinin gelişim sürecine katkıda bulunmaktadır. VakıfBank; bölgesinin e

Groupe BPCE, at the service of its customers and the French economy Groupe BPCE pursues a full range of banking and insurance activities, working through its two major Banque Populaire and Caisse d’Epargne cooperative banking networks and through its different subsidiaries. Groupe BPCE, the 2n

Somos el banco peruano que desde hace más de 130 años viene liderando el sistema financiero a nivel nacional. A lo largo de todo este tiempo hemos contribuido con el desarrollo económico de nuestro país, transformando planes en realidad. Todo esto es posible gracias al equipo de profesionales de p

At National Bank, we believe in the potential of each individual, and that even the smallest gestures can make a big difference. When we help others accomplish their projects, we help empower them and the community at large. We try to make a difference through innovation, but above all, by puttin

OCBC is the longest established Singapore bank, formed in 1932 from the merger of three local banks, the oldest of which was founded in 1912. It is now the second largest financial services group in Southeast Asia by assets and one of the world’s most highly-rated banks, with an Aa1 rating from Mood
Welcome to Huntington. Huntington Bancshares Incorporated is a $210 billion asset regional bank holding company headquartered in Columbus, Ohio. Founded in 1866, The Huntington National Bank and its affiliates provide consumers, small and middle-market businesses, corporations, municipalities, and

Regions Financial Corporation is a member of the S&P 500 Index and is one of the nation’s largest full-service providers of consumer and commercial banking, wealth management, and mortgage products and services. Regions serves customers across the South, Midwest and Texas, and through its subsidiary
.png)
A near-collapse of the global software vulnerability database exposed critical weaknesses that could leave banks unable to track cyber...
FiCare Federal Credit Union said hackers breached an online banking platform that Fiserv provides and stole members' money.
NEW DELHI, Jan. 29, 2026 /PRNewswire/ -- The nationwide cybersecurity awareness movement 'Twice is Wise', a large-scale CSR initiative...
Federal Bank's nationwide cybersecurity awareness initiative, 'Twice is Wise', concluded in New Delhi, marking the culmination of a...
The U.K. conducted simulated cybersecurity attacks on its banks' live systems and found they lack basic patching and identity controls.
The National Institute of Standards and Technology's preliminary draft helps banks integrate artificial intelligence into their existing...
The U.S. federal government shutdown has slashed staff at the nation's cyber defense agency and other key cyber entities, freezing daily...
"Victims often suffer the loss of entire banking, savings, retirement, or investment accounts under the guise of 'protecting' their assets,"...
First launched in 2021, Twice is Wise is Federal Bank's flagship Corporate Social Responsibility (CSR) initiative in partnership with the Indian...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Federal Bank is http://www.federalbank.co.in.
According to Rankiteo, Federal Bank’s AI-generated cybersecurity score is 775, reflecting their Fair security posture.
According to Rankiteo, Federal Bank currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Federal Bank has been affected by a supply chain cyber incident involving VMware, with the incident ID VMWFED1769279335.
According to Rankiteo, Federal Bank is not certified under SOC 2 Type 1.
According to Rankiteo, Federal Bank does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Federal Bank is not listed as GDPR compliant.
According to Rankiteo, Federal Bank does not currently maintain PCI DSS compliance.
According to Rankiteo, Federal Bank is not compliant with HIPAA regulations.
According to Rankiteo,Federal Bank is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Federal Bank operates primarily in the Banking industry.
Federal Bank employs approximately 12,365 people worldwide.
Federal Bank presently has no subsidiaries across any sectors.
Federal Bank’s official LinkedIn profile has approximately 704,473 followers.
Federal Bank is classified under the NAICS code 52211, which corresponds to Commercial Banking.
Yes, Federal Bank has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/federal-bank-ltd.
Yes, Federal Bank maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/federal-bank.
As of April 02, 2026, Rankiteo reports that Federal Bank has experienced 1 cybersecurity incidents.
Federal Bank has an estimated 7,284 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability.
Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with network segmentation to restrict vcenter access to trusted administrative networks, and remediation measures with upgrade to the latest secure versions of vcenter server, and network segmentation with recommended, and enhanced monitoring with monitoring for anomalous dcerpc traffic, auditing access logs for unauthorized attempts..
Title: Critical VMware vCenter Vulnerability Added to CISA’s Exploited Flaws Catalog
Description: CISA has added CVE-2024-37079, a critical vulnerability in Broadcom’s VMware vCenter Server, to its Known Exploited Vulnerabilities (KEV) catalog after confirming active exploitation in the wild. The flaw is an out-of-bounds write issue in the DCERPC protocol implementation, allowing unauthenticated attackers with network access to execute remote code and potentially gain full control of affected systems. A compromised vCenter Server could enable lateral movement across virtualized infrastructure, posing a high-risk threat to enterprises.
Type: Remote Code Execution (RCE)
Attack Vector: Network access to vCenter Server via DCERPC protocol
Vulnerability Exploited: CVE-2024-37079 (CWE-787 - Out-of-bounds Write)
Motivation: Initial access for lateral movement, potential ransomware deployment
Common Attack Types: The most common types of attacks the company has faced is Vulnerability.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Unauthenticated network access to vCenter Server via DCERPC protocol.

Systems Affected: VMware vCenter Server, virtualized infrastructure
Operational Impact: Potential full control of virtualized environments, lateral movement

Entity Name: Broadcom (VMware)
Entity Type: Technology/Virtualization
Industry: Information Technology
Customers Affected: Enterprises using VMware vCenter Server

Containment Measures: Network segmentation to restrict vCenter access to trusted administrative networks
Remediation Measures: Upgrade to the latest secure versions of vCenter Server
Network Segmentation: Recommended
Enhanced Monitoring: Monitoring for anomalous DCERPC traffic, auditing access logs for unauthorized attempts
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Upgrade to the latest secure versions of vCenter Server.
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by network segmentation to restrict vcenter access to trusted administrative networks.

Regulatory Notifications: CISA KEV catalog addition mandates remediation for FCEB agencies by February 13, 2026

Recommendations: Upgrade to the latest secure versions of vCenter Server, implement network segmentation, monitor for anomalous DCERPC traffic, and audit access logs for unauthorized attempts.
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Upgrade to the latest secure versions of vCenter Server, implement network segmentation, monitor for anomalous DCERPC traffic and and audit access logs for unauthorized attempts..

Source: CISA Known Exploited Vulnerabilities Catalog
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: CISA Known Exploited Vulnerabilities Catalog.

Investigation Status: Active exploitation confirmed, remediation deadline set for FCEB agencies

Entry Point: Unauthenticated network access to vCenter Server via DCERPC protocol
High Value Targets: Virtualized infrastructure, enterprise environments
Data Sold on Dark Web: Virtualized infrastructure, enterprise environments

Root Causes: Out-of-bounds write vulnerability (CWE-787) in DCERPC protocol implementation
Corrective Actions: Patch management, network segmentation, enhanced monitoring
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Monitoring for anomalous DCERPC traffic, auditing access logs for unauthorized attempts.
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Patch management, network segmentation, enhanced monitoring.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Network segmentation to restrict vCenter access to trusted administrative networks.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Upgrade to the latest secure versions of vCenter Server, implement network segmentation, monitor for anomalous DCERPC traffic and and audit access logs for unauthorized attempts..
Most Recent Source: The most recent source of information about an incident is CISA Known Exploited Vulnerabilities Catalog.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Active exploitation confirmed, remediation deadline set for FCEB agencies.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Unauthenticated network access to vCenter Server via DCERPC protocol.
.png)
A vulnerability was found in Nothings stb up to 1.26. Impacted is the function stbtt_InitFont_internal in the library stb_truetype.h of the component TTF File Handler. Performing a manipulation results in out-of-bounds read. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read in VS6ComFile!get_macro_mem_COM. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain a stack-based buffer overflow in VS6ComFile!CSaveData::_conv_AnimationItem. Opening a crafted V7 file may lead to arbitrary code execution on the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6MemInIF!set_temp_type_default. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6ComFile!load_link_inf. Opening a crafted V7 file may lead to information disclosure from the affected product.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.