Sawtooth Company Cyber Security Posture

sawtoothsoftware.com

Sawtooth Software is a leading provider of analytical tools that empower organizations to build predictive models of how their customers make decisions and what aspects of a product or service they value most. Users of our software include Fortune 1000 companies in consumer and B2B markets, government agencies, market research firms, and universities. These organizations use our software for product and pricing research, social policy inquiries, epidemiological studies, academic investigations, and opinion polling. In addition to our products and solutions platform, we offer consulting and educational services. Sawtooth Software hosts a well-respected research conference and software training workshops. The papers presented at our conference are often cited in academic journals, books, and trade publications. Sawtooth Software is a privately owned company located in Provo, Utah.

Sawtooth Company Details

Linkedin ID:

sawtooth-software

Employees number:

52 employees

Number of followers:

2238.0

NAICS:

511

Industry Type:

Software Development

Homepage:

sawtoothsoftware.com

IP Addresses:

Scan still pending

Company ID:

SAW_1854280

Scan Status:

In-progress

AI scoreSawtooth Risk Score (AI oriented)

Between 900 and 1000

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

globalscoreSawtooth Global Score
blurone
Ailogo

Sawtooth Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 900 and 1000

Sawtooth Company Cyber Security News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenUrl IDDetailsView
Sawtooth SoftwareVulnerability1007/2025SAW719072225Link
Rankiteo Explanation :
Attack threatening the organizationโ€™s existence

Description: A critical remote code execution vulnerability (CVE-2025-34300) has been discovered in Lighthouse Studio, a survey software platform developed by Sawtooth Software. This vulnerability affects the Perl CGI scripts that power web-based surveys, potentially exposing thousands of hosting servers to complete compromise. The flaw resides in the server-side components, where a templating engine processes user input without proper sanitization. Security researchers found that the softwareโ€™s templating system evaluates content between [% %] markers as executable Perl code, creating a direct pathway for remote code execution. This issue amplifies the potential attack surface and complicates remediation efforts due to the proliferation of vulnerable script instances across web infrastructures.

Sawtooth Company Subsidiaries

SubsidiaryImage

Sawtooth Software is a leading provider of analytical tools that empower organizations to build predictive models of how their customers make decisions and what aspects of a product or service they value most. Users of our software include Fortune 1000 companies in consumer and B2B markets, government agencies, market research firms, and universities. These organizations use our software for product and pricing research, social policy inquiries, epidemiological studies, academic investigations, and opinion polling. In addition to our products and solutions platform, we offer consulting and educational services. Sawtooth Software hosts a well-respected research conference and software training workshops. The papers presented at our conference are often cited in academic journals, books, and trade publications. Sawtooth Software is a privately owned company located in Provo, Utah.

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=sawtooth-software' -H 'apikey: YOUR_API_KEY_HERE'
newsone

Sawtooth Cyber Security News

2019-10-14T07:00:00.000Z
State of Idaho, Idaho National Laboratory celebrate opening of new buildings

โ€œThese facilities not only will enhance INL's supercomputing and cybersecurity capabilities, but also serve Idaho's university students andย ...

2022-02-10T18:16:01.000Z
Sawtooth C-UAS mesh network demonstrated at U.S. Army's DiDEX 3

BOISE, Idaho. Black Sage's Sawtooth Mesh Network counter-unmanned aerial system (C-UAS) capability was demonstrated in an urban environment at the U.S.ย ...

2021-10-29T03:21:02.000Z
FIGURE 2. Multimedia forensics investigation using Blockchain...

Due to globalization and worldwide connectivity, multimedia data exchange has increased significantly over the Internet in the last decade.

similarCompanies

Sawtooth Similar Companies

Bosch Global Software Technologies

With our unique ability to offer end-to-end solutions that connect the three pillars of IoT - Sensors, Software, and Services, we enable businesses to move from the traditional to the digital, or improve businesses by introducing a digital element in their products and processes. Now more than ever

Tencent

Tencent is a world-leading internet and technology company that develops innovative products and services to improve the quality of life of people around the world. Founded in 1998 with its headquarters in Shenzhen, China, Tencent's guiding principle is to use technology for good. Our communication

Workday

Workday is a leading provider of enterprise cloud applications for finance and human resources, helping customers adapt and thrive in a changing world. Workday applications for financial management, human resources, planning, spend management, and analytics are built with artificial intelligence and

Nielsen

Nielsen shapes the worldโ€™s media and content as a global leader in audience insights, data and analytics. Through our understanding of people and their behaviors across all channels and platforms, we empower our clients with independent and actionable intelligence so they can connect and engage with

bigbasket

Starting our journey in 2011, today, bigbasket - a Tata Enterprise is Indiaโ€™s largest online supermarket with over 13 million customers and a presence in 60+ cities & towns. With our presence spanning the entire spectrum of consumer needs, we operate through a range of business lines - bigbasket, bb

IGT (NYSE:IGT) is the global leader in gaming. We deliver entertaining and responsible gaming experiences for players across all channels and regulated segments, from Lotteries and Gaming Machines to Sports Betting and Digital. Leveraging a wealth of compelling content, substantial investment in inn

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Sawtooth CyberSecurity History Information

How many cyber incidents has Sawtooth faced?

Total Incidents: According to Rankiteo, Sawtooth has faced 1 incident in the past.

What types of cybersecurity incidents have occurred at Sawtooth?

Incident Types: The types of cybersecurity incidents that have occurred incident Vulnerability.

How does Sawtooth detect and respond to cybersecurity incidents?

Detection and Response: The company detects and responds to cybersecurity incidents through remediation measures with Update to version 9.16.14.

Incident Details

Can you provide details on each incident?

Incident : Remote Code Execution

Title: Critical Remote Code Execution Vulnerability in Lighthouse Studio

Description: A critical remote code execution vulnerability (CVE-2025-34300) has been discovered in Lighthouse Studio, a survey software platform developed by Sawtooth Software. The flaw affects Perl CGI scripts that power web-based surveys, potentially exposing thousands of hosting servers to complete compromise by attackers who possess a survey link.

Date Publicly Disclosed: 2025-07-09

Type: Remote Code Execution

Attack Vector: Web-based survey links

Vulnerability Exploited: CVE-2025-34300

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Vulnerability.

How does the company identify the attack vectors used in incidents?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Survey links.

Impact of the Incidents

What was the impact of each incident?

Incident : Remote Code Execution SAW719072225

Systems Affected: Thousands of hosting servers

Which entities were affected by each incident?

Incident : Remote Code Execution SAW719072225

Entity Type: Software Developer

Industry: Survey Software

Response to the Incidents

What measures were taken in response to each incident?

Incident : Remote Code Execution SAW719072225

Remediation Measures: Update to version 9.16.14

Data Breach Information

What measures does the company take to prevent data exfiltration?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Update to version 9.16.14.

Lessons Learned and Recommendations

What recommendations were made to prevent future incidents?

Incident : Remote Code Execution SAW719072225

Recommendations: Organizations should immediately update to the patched version 9.16.14 to prevent potential compromise of their hosting infrastructure.

What recommendations has the company implemented to improve cybersecurity?

Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Organizations should immediately update to the patched version 9.16.14 to prevent potential compromise of their hosting infrastructure..

References

Where can I find more information about each incident?

Incident : Remote Code Execution SAW719072225

Source: Assetnote

Where can stakeholders find additional resources on cybersecurity best practices?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Assetnote.

Initial Access Broker

How did the initial access broker gain entry for each incident?

Incident : Remote Code Execution SAW719072225

Entry Point: Survey links

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident?

Incident : Remote Code Execution SAW719072225

Root Causes: Inadequate input sanitization in the templating engine

Corrective Actions: Update to version 9.16.14

What corrective actions has the company taken based on post-incident analysis?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Update to version 9.16.14.

Additional Questions

Incident Details

What was the most recent incident publicly disclosed?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-07-09.

Impact of the Incidents

What was the most significant system affected in an incident?

Most Significant System Affected: The most significant system affected in an incident was Thousands of hosting servers.

Lessons Learned and Recommendations

What was the most significant recommendation implemented to improve cybersecurity?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Organizations should immediately update to the patched version 9.16.14 to prevent potential compromise of their hosting infrastructure..

References

What is the most recent source of information about an incident?

Most Recent Source: The most recent source of information about an incident is Assetnote.

Initial Access Broker

What was the most recent entry point used by an initial access broker?

Most Recent Entry Point: The most recent entry point used by an initial access broker was an Survey links.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge