ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Les Allocations familiales, c’est d’abord un réseau composé de la Caisse nationale d’Allocations familiales (Cnaf),composée de 11 sites, et de 101 Caf réparties sur tout le territoire français (Métropole et Outre-Mer). Les Caisses d’allocations familiales, plus connues par le grand public sous l’appellation Caf, sont des organismes de droit privé, investis d’une mission de service public. Aux côtés des familles, des couples et des personnes seules, notre ambition est de participer à la solidarité nationale et combattre la précarité. Nos missions : - Assister toutes les familles pour concilier vie familiale, professionnelle et sociale - Œuvrer pour un meilleur accès aux droits - Lutter contre les inégalités sociales et territoriales - Contribuer au développement de nouvelles structures - Favoriser la mixité sociale et lutter contre toute forme de discrimination Les Allocations familiales, ce sont aussi plus de 35 000 collaborateurs et une cinquantaine de métiers différents. Jeunes diplômés ou professionnels plus expérimentés, nous accueillons des profils aussi divers que variés. Nous croyons au talent et à la force collective de nos collaborateurs. En tant qu’employeur socialement responsable, nous mettons en œuvre des actions pour : - Garantir l’équité de traitement et l’égalité des chances - Donner du sens et améliorer les conditions de travail - Favoriser la conciliation vie professionnelle / vie personnelle - Assurer l’accès à la formation professionnelle tout au long de la carrière... Venez nous découvrir : politique employeur, diversité de nos métiers, actualités locales, conseils RH aux candidats... Les réseaux sociaux de la Caisse Nationale des Allocations Familiales et de l’ensemble des Caf, ne sont pas des relais d’échange sur vos dossiers d’allocataires. Nous vous prions donc, de ne transmettre aucun document ou information comprenant vos données personnelles.

Caisse nationale des allocations familiales - Cnaf A.I CyberSecurity Scoring

CNDAFC

Company Details

Linkedin ID:

caf-allocations-familiales

Employees number:

4,219

Number of followers:

121,334

NAICS:

92

Industry Type:

Government Administration

Homepage:

caf.fr

IP Addresses:

0

Company ID:

CAI_2209050

Scan Status:

In-progress

AI scoreCNDAFC Risk Score (AI oriented)

Between 700 and 749

https://images.rankiteo.com/companyimages/caf-allocations-familiales.jpeg
CNDAFC Government Administration
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreCNDAFC Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/caf-allocations-familiales.jpeg
CNDAFC Government Administration
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

CNDAFC Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
Ministère de l'Intérieur and Caisse d'Allocations Familiales: Le pirate du ministère de l'Intérieur revendique un hack de la CAF: la Caisse nationale nie toute attaque et "confirme la sécurité de son système d'information"Cyber Attack100812/2025
Rankiteo Explanation :
Attack that could bring to a war

Description: **Cyberattack Claim Targets French Family Benefits Agency (CAF) Amid Hacker’s Escalating Threats** A hacker known as *Indra*, who previously claimed responsibility for a cyberattack on France’s Interior Ministry, has now alleged a breach of the *Caisse d’Allocations Familiales* (CAF), the national family benefits agency. In a post on the cybercriminal forum *Breachforums* late yesterday, the hacker asserted access to 15 GB of data—reportedly containing 22 million lines of personal information on nearly 4 million beneficiaries. The leaked files, reviewed by *BFMTV*, include names, birthdates, email addresses, and phone numbers of individuals registered with the CAF between September 2022 and November 2025. Indra framed the attack as a "Christmas gift to France." The CAF swiftly denied the claims, stating that no intrusion or vulnerability had been detected in its systems. In an official response, the agency insisted its infrastructure remains secure and that the exposed data did not originate from its own databases. Instead, the CAF suggested the information may have been sourced from other public services with which it exchanges data, though it confirmed no technical breach of its information flows. Notably, the agency emphasized that no banking details or passwords were included in the leaked files. The same *Indra* account had earlier claimed responsibility for compromising the Interior Ministry’s systems, including sensitive police databases like the *Traitement des Antécédents Judiciaires* (TAJ) and the *Fichier des Personnes Recherchées* (FPR). That attack was reportedly executed by hijacking personal email accounts of ministry employees. Authorities arrested a 22-year-old suspect in connection with the Interior Ministry breach just hours before the CAF-related post appeared, though the origin of the CAF data remains unconfirmed. While the CAF maintains its systems were not breached, the authenticity of the leaked data raises questions about the broader security of interconnected public-sector networks. Investigations into both incidents are ongoing.

Ministère de l'Intérieur and Caisse d'Allocations Familiales: Le pirate du ministère de l'Intérieur revendique un hack de la CAF: la Caisse nationale nie toute attaque et "confirme la sécurité de son système d'information"
Cyber Attack
Severity: 100
Impact: 8
Seen: 12/2025
Blog:
Rankiteo Explanation
Attack that could bring to a war

Description: **Cyberattack Claim Targets French Family Benefits Agency (CAF) Amid Hacker’s Escalating Threats** A hacker known as *Indra*, who previously claimed responsibility for a cyberattack on France’s Interior Ministry, has now alleged a breach of the *Caisse d’Allocations Familiales* (CAF), the national family benefits agency. In a post on the cybercriminal forum *Breachforums* late yesterday, the hacker asserted access to 15 GB of data—reportedly containing 22 million lines of personal information on nearly 4 million beneficiaries. The leaked files, reviewed by *BFMTV*, include names, birthdates, email addresses, and phone numbers of individuals registered with the CAF between September 2022 and November 2025. Indra framed the attack as a "Christmas gift to France." The CAF swiftly denied the claims, stating that no intrusion or vulnerability had been detected in its systems. In an official response, the agency insisted its infrastructure remains secure and that the exposed data did not originate from its own databases. Instead, the CAF suggested the information may have been sourced from other public services with which it exchanges data, though it confirmed no technical breach of its information flows. Notably, the agency emphasized that no banking details or passwords were included in the leaked files. The same *Indra* account had earlier claimed responsibility for compromising the Interior Ministry’s systems, including sensitive police databases like the *Traitement des Antécédents Judiciaires* (TAJ) and the *Fichier des Personnes Recherchées* (FPR). That attack was reportedly executed by hijacking personal email accounts of ministry employees. Authorities arrested a 22-year-old suspect in connection with the Interior Ministry breach just hours before the CAF-related post appeared, though the origin of the CAF data remains unconfirmed. While the CAF maintains its systems were not breached, the authenticity of the leaked data raises questions about the broader security of interconnected public-sector networks. Investigations into both incidents are ongoing.

Ailogo

CNDAFC Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for CNDAFC

Incidents vs Government Administration Industry Average (This Year)

Caisse nationale des allocations familiales - Cnaf has 21.95% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs All-Companies Average (This Year)

Caisse nationale des allocations familiales - Cnaf has 28.21% more incidents than the average of all companies with at least one recorded incident.

Incident Types CNDAFC vs Government Administration Industry Avg (This Year)

Caisse nationale des allocations familiales - Cnaf reported 1 incidents this year: 1 cyber attacks, 0 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.

Incident History — CNDAFC (X = Date, Y = Severity)

CNDAFC cyber incidents detection timeline including parent company and subsidiaries

CNDAFC Company Subsidiaries

SubsidiaryImage

Les Allocations familiales, c’est d’abord un réseau composé de la Caisse nationale d’Allocations familiales (Cnaf),composée de 11 sites, et de 101 Caf réparties sur tout le territoire français (Métropole et Outre-Mer). Les Caisses d’allocations familiales, plus connues par le grand public sous l’appellation Caf, sont des organismes de droit privé, investis d’une mission de service public. Aux côtés des familles, des couples et des personnes seules, notre ambition est de participer à la solidarité nationale et combattre la précarité. Nos missions : - Assister toutes les familles pour concilier vie familiale, professionnelle et sociale - Œuvrer pour un meilleur accès aux droits - Lutter contre les inégalités sociales et territoriales - Contribuer au développement de nouvelles structures - Favoriser la mixité sociale et lutter contre toute forme de discrimination Les Allocations familiales, ce sont aussi plus de 35 000 collaborateurs et une cinquantaine de métiers différents. Jeunes diplômés ou professionnels plus expérimentés, nous accueillons des profils aussi divers que variés. Nous croyons au talent et à la force collective de nos collaborateurs. En tant qu’employeur socialement responsable, nous mettons en œuvre des actions pour : - Garantir l’équité de traitement et l’égalité des chances - Donner du sens et améliorer les conditions de travail - Favoriser la conciliation vie professionnelle / vie personnelle - Assurer l’accès à la formation professionnelle tout au long de la carrière... Venez nous découvrir : politique employeur, diversité de nos métiers, actualités locales, conseils RH aux candidats... Les réseaux sociaux de la Caisse Nationale des Allocations Familiales et de l’ensemble des Caf, ne sont pas des relais d’échange sur vos dossiers d’allocataires. Nous vous prions donc, de ne transmettre aucun document ou information comprenant vos données personnelles.

Loading...
similarCompanies

CNDAFC Similar Companies

U.S. Department of Veterans Affairs

Welcome to the United States Department of Veterans Affairs (VA) Official LinkedIn page. We're recruiting the finest employees to care for our #Veterans. Following/engagement ≠ signify VA endorsement. This is a moderated page, meaning that all comments will be reviewed for appropriate content. Ple

City of Houston

Home to a respected and energetic cultural arts scene, celebrated restaurants featuring flavors from 35 countries, world-renowned theater groups and the brains behind U.S. space exploration, Houston is a diverse metropolis brimming with personality. With nearly 21,000 concerts, plays, exhibition

Malmö stad

Bli en samhällsbyggare – jobba i Malmö stad! Genom att arbeta i Malmö stad får du möjlighet att arbeta med hållbar samhällsutveckling. Som en samhällsbyggare spelar du en viktig roll i Malmös utveckling och därför ser vi oss som framtidens arbetsplats. Människors lika värde är en förutsättning fö

U.S. Department of the Treasury

The Treasury Department is the executive agency responsible for promoting economic prosperity and ensuring the financial security of the United States. The Department is responsible for a wide range of activities such as advising the President on economic and financial issues, encouraging sustainabl

Government of Canada

The Government of Canada works on behalf of Canadians, both at home and abroad. Visit www.Canada.ca to learn more. Canada’s professional, non-partisan public service is among the best in the world, and many of its departments and agencies place in Canada’s Top 100 Employers year after year. If you

Transportation Security Administration (TSA)

The Transportation Security Administration (TSA) is a component agency of the U.S. Department of Homeland Security (DHS), committed to securing the nation’s transportation systems to ensure safe and efficient travel for all. Our mission is to protect the American people by preventing threats and dis

Department for Education

Help us achieve world-class education, training and care for everyone, whatever their background. Whether you're just starting out, or an experienced professional, we have what you are looking for. Jobs include administration, policy advisers, digital, finance, commercial specialists and many more

National Park Service

Most people know that the National Park Service cares for national parks, a network of over 420 natural, cultural and recreational sites across the nation. The treasures in this system – the first of its kind in the world – have been set aside by the American people to preserve, protect, and share t

State of Minnesota

Minnesota State Government is the third largest employer in the state of Minnesota, employing over 50,000 diverse and talented employees in more than 100 state agencies, boards, commissions, colleges, and universities. Our workplaces can be found across the state in 86 out of 87 Minnesota counties a

newsone

CNDAFC CyberSecurity News

October 15, 2025 07:00 AM
CNAF Accelerates Digital Transformation with VMware Cloud Foundation

Paris, October 15th, 2025 – Broadcom Inc. today announced that the Caisse Nationale des Allocations Familiales (CNAF), a cornerstone of...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

CNDAFC CyberSecurity History Information

Official Website of Caisse nationale des allocations familiales - Cnaf

The official website of Caisse nationale des allocations familiales - Cnaf is https://caf.fr/professionnels/nous-connaitre/presentation.

Caisse nationale des allocations familiales - Cnaf’s AI-Generated Cybersecurity Score

According to Rankiteo, Caisse nationale des allocations familiales - Cnaf’s AI-generated cybersecurity score is 740, reflecting their Moderate security posture.

How many security badges does Caisse nationale des allocations familiales - Cnaf’ have ?

According to Rankiteo, Caisse nationale des allocations familiales - Cnaf currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Caisse nationale des allocations familiales - Cnaf have SOC 2 Type 1 certification ?

According to Rankiteo, Caisse nationale des allocations familiales - Cnaf is not certified under SOC 2 Type 1.

Does Caisse nationale des allocations familiales - Cnaf have SOC 2 Type 2 certification ?

According to Rankiteo, Caisse nationale des allocations familiales - Cnaf does not hold a SOC 2 Type 2 certification.

Does Caisse nationale des allocations familiales - Cnaf comply with GDPR ?

According to Rankiteo, Caisse nationale des allocations familiales - Cnaf is not listed as GDPR compliant.

Does Caisse nationale des allocations familiales - Cnaf have PCI DSS certification ?

According to Rankiteo, Caisse nationale des allocations familiales - Cnaf does not currently maintain PCI DSS compliance.

Does Caisse nationale des allocations familiales - Cnaf comply with HIPAA ?

According to Rankiteo, Caisse nationale des allocations familiales - Cnaf is not compliant with HIPAA regulations.

Does Caisse nationale des allocations familiales - Cnaf have ISO 27001 certification ?

According to Rankiteo,Caisse nationale des allocations familiales - Cnaf is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Caisse nationale des allocations familiales - Cnaf

Caisse nationale des allocations familiales - Cnaf operates primarily in the Government Administration industry.

Number of Employees at Caisse nationale des allocations familiales - Cnaf

Caisse nationale des allocations familiales - Cnaf employs approximately 4,219 people worldwide.

Subsidiaries Owned by Caisse nationale des allocations familiales - Cnaf

Caisse nationale des allocations familiales - Cnaf presently has no subsidiaries across any sectors.

Caisse nationale des allocations familiales - Cnaf’s LinkedIn Followers

Caisse nationale des allocations familiales - Cnaf’s official LinkedIn profile has approximately 121,334 followers.

NAICS Classification of Caisse nationale des allocations familiales - Cnaf

Caisse nationale des allocations familiales - Cnaf is classified under the NAICS code 92, which corresponds to Public Administration.

Caisse nationale des allocations familiales - Cnaf’s Presence on Crunchbase

No, Caisse nationale des allocations familiales - Cnaf does not have a profile on Crunchbase.

Caisse nationale des allocations familiales - Cnaf’s Presence on LinkedIn

Yes, Caisse nationale des allocations familiales - Cnaf maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/caf-allocations-familiales.

Cybersecurity Incidents Involving Caisse nationale des allocations familiales - Cnaf

As of December 18, 2025, Rankiteo reports that Caisse nationale des allocations familiales - Cnaf has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

Caisse nationale des allocations familiales - Cnaf has an estimated 11,742 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Caisse nationale des allocations familiales - Cnaf ?

Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.

How does Caisse nationale des allocations familiales - Cnaf detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an law enforcement notified with yes (investigation ongoing), and communication strategy with public denial of breach, clarification on data origin..

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: Alleged Cyberattack on Caisse d'Allocations Familiales (CAF) by Hacker Indra

Description: Hacker Indra claimed to have compromised the systems of the Caisse d'Allocations Familiales (CAF) and published 15 GB of data containing personal information of nearly 4 million allocataires. CAF denies any intrusion into its systems, suggesting the data may originate from other public services.

Type: Data Breach

Attack Vector: Compromised employee personal accounts (alleged)

Threat Actor: Indra

Motivation: Unknown (possibly financial gain or disruption)

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

How does the company identify the attack vectors used in incidents ?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Alleged compromise of employee personal accounts (Ministry of Interior attack).

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach MINCAF1766073386

Data Compromised: 15 GB of data, 22 million lines of information

Brand Reputation Impact: Potential reputational damage due to data exposure

Identity Theft Risk: High (personal data exposed)

Payment Information Risk: None (no banking data or passwords exposed)

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, First Names, Dates Of Birth, Emails, Phone Numbers and .

Which entities were affected by each incident ?

Incident : Data Breach MINCAF1766073386

Entity Name: Caisse d'Allocations Familiales (CAF)

Entity Type: Government Agency

Industry: Social Services

Location: France

Customers Affected: Nearly 4 million allocataires

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Data Breach MINCAF1766073386

Law Enforcement Notified: Yes (investigation ongoing)

Communication Strategy: Public denial of breach, clarification on data origin

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach MINCAF1766073386

Type of Data Compromised: Names, First names, Dates of birth, Emails, Phone numbers

Number of Records Exposed: 22 million lines of information (allegedly 4 million allocataires)

Sensitivity of Data: High (personally identifiable information)

Data Exfiltration: Yes (15 GB of data published)

Personally Identifiable Information: Yes

Regulatory Compliance

Were there any regulatory violations and fines imposed for each incident ?

Incident : Data Breach MINCAF1766073386

Legal Actions: Investigation opened for 'atteinte à un système de traitement automatisé de données à caractère personnel mis en œuvre par l'Etat en bande organisée'

How does the company ensure compliance with regulatory requirements ?

Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Investigation opened for 'atteinte à un système de traitement automatisé de données à caractère personnel mis en œuvre par l'Etat en bande organisée'.

References

Where can I find more information about each incident ?

Incident : Data Breach MINCAF1766073386

Source: BFMTV

Incident : Data Breach MINCAF1766073386

Source: Breachforums (cybercrime forum)

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: BFMTV, and Source: Breachforums (cybercrime forum).

Investigation Status

What is the current status of the investigation for each incident ?

Incident : Data Breach MINCAF1766073386

Investigation Status: Ongoing (22-year-old suspect arrested)

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public denial of breach and clarification on data origin.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : Data Breach MINCAF1766073386

Customer Advisories: CAF issued a public statement denying the breach and clarifying data origin

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was CAF issued a public statement denying the breach and clarifying data origin.

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : Data Breach MINCAF1766073386

Entry Point: Alleged compromise of employee personal accounts (Ministry of Interior attack)

Additional Questions

General Information

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident was an Indra.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were 15 GB of data and 22 million lines of information.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were 15 GB of data and 22 million lines of information.

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 26.0M.

Regulatory Compliance

What was the most significant legal action taken for a regulatory violation ?

Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Investigation opened for 'atteinte à un système de traitement automatisé de données à caractère personnel mis en œuvre par l'Etat en bande organisée'.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident are Breachforums (cybercrime forum) and BFMTV.

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing (22-year-old suspect arrested).

Stakeholder and Customer Advisories

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued was an CAF issued a public statement denying the breach and clarifying data origin.

Initial Access Broker

What was the most recent entry point used by an initial access broker ?

Most Recent Entry Point: The most recent entry point used by an initial access broker was an Alleged compromise of employee personal accounts (Ministry of Interior attack).

cve

Latest Global CVEs (Not Company-Specific)

Description

Zerobyte is a backup automation tool Zerobyte versions prior to 0.18.5 and 0.19.0 contain an authentication bypass vulnerability where authentication middleware is not properly applied to API endpoints. This results in certain API endpoints being accessible without valid session credentials. This is dangerous for those who have exposed Zerobyte to be used outside of their internal network. A fix has been applied in both version 0.19.0 and 0.18.5. If immediate upgrade is not possible, restrict network access to the Zerobyte instance to trusted networks only using firewall rules or network segmentation. This is only a temporary mitigation; upgrading is strongly recommended.

Risk Information
cvss3
Base: 9.1
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Description

Open Source Point of Sale (opensourcepos) is a web based point of sale application written in PHP using CodeIgniter framework. Starting in version 3.4.0 and prior to version 3.4.2, a Cross-Site Request Forgery (CSRF) vulnerability exists in the application's filter configuration. The CSRF protection mechanism was **explicitly disabled**, allowing the application to process state-changing requests (POST) without verifying a valid CSRF token. An unauthenticated remote attacker can exploit this by hosting a malicious web page. If a logged-in administrator visits this page, their browser is forced to send unauthorized requests to the application. A successful exploit allows the attacker to silently create a new Administrator account with full privileges, leading to a complete takeover of the system and loss of confidentiality, integrity, and availability. The vulnerability has been patched in version 3.4.2. The fix re-enables the CSRF filter in `app/Config/Filters.php` and resolves associated AJAX race conditions by adjusting token regeneration settings. As a workaround, administrators can manually re-enable the CSRF filter in `app/Config/Filters.php` by uncommenting the protection line. However, this is not recommended without applying the full patch, as it may cause functionality breakage in the Sales module due to token synchronization issues.

Risk Information
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Description

Zed, a code editor, has an aribtrary code execution vulnerability in versions prior to 0.218.2-pre. The Zed IDE loads Model Context Protocol (MCP) configurations from the `settings.json` file located within a project’s `.zed` subdirectory. A malicious MCP configuration can contain arbitrary shell commands that run on the host system with the privileges of the user running the IDE. This can be triggered automatically without any user interaction besides opening the project in the IDE. Version 0.218.2-pre fixes the issue by implementing worktree trust mechanism. As a workaround, users should carefully review the contents of project settings files (`./zed/settings.json`) before opening new projects in Zed.

Risk Information
cvss3
Base: 7.7
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
Description

Zed, a code editor, has an aribtrary code execution vulnerability in versions prior to 0.218.2-pre. The Zed IDE loads Language Server Protocol (LSP) configurations from the `settings.json` file located within a project’s `.zed` subdirectory. A malicious LSP configuration can contain arbitrary shell commands that run on the host system with the privileges of the user running the IDE. This can be triggered when a user opens project file for which there is an LSP entry. A concerted effort by an attacker to seed a project settings file (`./zed/settings.json`) with malicious language server configurations could result in arbitrary code execution with the user's privileges if the user opens the project in Zed without reviewing the contents. Version 0.218.2-pre fixes the issue by implementing worktree trust mechanism. As a workaround, users should carefully review the contents of project settings files (`./zed/settings.json`) before opening new projects in Zed.

Risk Information
cvss3
Base: 7.7
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
Description

Storybook is a frontend workshop for building user interface components and pages in isolation. A vulnerability present starting in versions 7.0.0 and prior to versions 7.6.21, 8.6.15, 9.1.17, and 10.1.10 relates to Storybook’s handling of environment variables defined in a `.env` file, which could, in specific circumstances, lead to those variables being unexpectedly bundled into the artifacts created by the `storybook build` command. When a built Storybook is published to the web, the bundle’s source is viewable, thus potentially exposing those variables to anyone with access. For a project to potentially be vulnerable to this issue, it must build the Storybook (i.e. run `storybook build` directly or indirectly) in a directory that contains a `.env` file (including variants like `.env.local`) and publish the built Storybook to the web. Storybooks built without a `.env` file at build time are not affected, including common CI-based builds where secrets are provided via platform environment variables rather than `.env` files. Storybook runtime environments (i.e. `storybook dev`) are not affected. Deployed applications that share a repo with your Storybook are not affected. Users should upgrade their Storybook—on both their local machines and CI environment—to version .6.21, 8.6.15, 9.1.17, or 10.1.10 as soon as possible. Maintainers additionally recommend that users audit for any sensitive secrets provided via `.env` files and rotate those keys. Some projects may have been relying on the undocumented behavior at the heart of this issue and will need to change how they reference environment variables after this update. If a project can no longer read necessary environmental variable values, either prefix the variables with `STORYBOOK_` or use the `env` property in Storybook’s configuration to manually specify values. In either case, do not include sensitive secrets as they will be included in the built bundle.

Risk Information
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=caf-allocations-familiales' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge