Badge
11,371 badges added since 01 January 2025
ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Columbia University Irving Medical Center (CUIMC) is a clinical, research, and educational enterprise located on a campus in northern Manhattan. We are home to four professional colleges and schools that provide global leadership in scientific research, health and medical education, and patient care, including: - Vagelos College of Physicians and Surgeons - College of Dental Medicine - School of Nursing - Mailman School of Public Health Patient Care Columbia University Irving Medical Center (CUIMC) is a leader in providing comprehensive patient care and offers a range of general and specialized medical, dental, and nursing services. We have more than 1,800 physicians, surgeons, dentists, and nurses in locations throughout the New York City metro area. We know each patient is unique. Our knowledge of innovative treatments is enhanced by our compassion for patients and their families and a devotion to maintaining the highest standard of care.

Columbia University Irving Medical Center A.I CyberSecurity Scoring

CUIMC

Company Details

Linkedin ID:

columbiamed

Employees number:

7,740

Number of followers:

90,294

NAICS:

62

Industry Type:

Hospitals and Health Care

Homepage:

columbia.edu

IP Addresses:

776

Company ID:

COL_9186114

Scan Status:

Completed

AI scoreCUIMC Risk Score (AI oriented)

Between 650 and 699

https://images.rankiteo.com/companyimages/columbiamed.jpeg
CUIMC Hospitals and Health Care
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreCUIMC Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/columbiamed.jpeg
CUIMC Hospitals and Health Care
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

CUIMC Company CyberSecurity News & History

Past Incidents
2
Attack Types
2
EntityTypeSeverityImpactSeenBlog DetailsSupply Chain SourceIncident DetailsView
Columbia University Irving Medical CenterRansomware100411/2025OracleMed Health Investments (Pty) LtdOracleMed Health Investments (Pty) Ltd
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Columbia Medical Practice Hit by Qilin Ransomware Attack, Exposing Sensitive Data of 3,000 Patients Columbia Medical Practice, a multi-specialty healthcare provider based in Howard County, Maryland, suffered a ransomware attack on November 5, 2025, orchestrated by the Qilin ransomware group. The attackers infiltrated the organization’s network, encrypted files, and exfiltrated sensitive patient data before publicly claiming responsibility on the dark web on November 24, 2025. The breach was officially reported to the U.S. Department of Health and Human Services (HHS) on December 5, 2025, affecting approximately 3,000 individuals. Exposed information included personally identifiable data (names, addresses, Social Security numbers, driver’s license and passport details), health records (diagnoses, treatment history, prescription details, and physician assignments), and financial and insurance data (account numbers, insurance IDs, and payment information). Columbia Medical Practice, which operates under a Patient-Centered Medical Home (PCMH) model, has established a toll-free assistance line (1-833-974-3375) for affected individuals. The law firm Shamis & Gentile P.A. is investigating potential legal claims for those impacted, citing possible compensation for damages such as identity theft or financial losses. The incident underscores the growing threat of ransomware attacks targeting healthcare providers and the exposure of highly sensitive patient data.

Columbia University Irving Medical CenterCyber Attack10056/2025NA
Rankiteo Explanation :
Attack threatening the organization's existence

Description: A cyberattack in June on Columbia University allowed hackers to access the sensitive personal information of more than 860,000 people. The breach exposed Social Security numbers, college application data, academic history, financial aid information, health insurance details, and more. The incident disrupted IT systems, causing outages and preventing students from accessing emails and assignment platforms. The hackers, identified as politically motivated, targeted student data to further their agenda. The stolen data was shared with major news outlets, leading to controversial reports. The university offered affected individuals two years of free credit monitoring services.

Columbia Medical Practice: Columbia Medical Practice Data Breach Lawsuit Investigation
Ransomware
Severity: 100
Impact: 4
Seen: 11/2025
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Columbia Medical Practice Hit by Qilin Ransomware Attack, Exposing Sensitive Data of 3,000 Patients Columbia Medical Practice, a multi-specialty healthcare provider based in Howard County, Maryland, suffered a ransomware attack on November 5, 2025, orchestrated by the Qilin ransomware group. The attackers infiltrated the organization’s network, encrypted files, and exfiltrated sensitive patient data before publicly claiming responsibility on the dark web on November 24, 2025. The breach was officially reported to the U.S. Department of Health and Human Services (HHS) on December 5, 2025, affecting approximately 3,000 individuals. Exposed information included personally identifiable data (names, addresses, Social Security numbers, driver’s license and passport details), health records (diagnoses, treatment history, prescription details, and physician assignments), and financial and insurance data (account numbers, insurance IDs, and payment information). Columbia Medical Practice, which operates under a Patient-Centered Medical Home (PCMH) model, has established a toll-free assistance line (1-833-974-3375) for affected individuals. The law firm Shamis & Gentile P.A. is investigating potential legal claims for those impacted, citing possible compensation for damages such as identity theft or financial losses. The incident underscores the growing threat of ransomware attacks targeting healthcare providers and the exposure of highly sensitive patient data.

Columbia University
Cyber Attack
Severity: 100
Impact: 5
Seen: 6/2025
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack threatening the organization's existence

Description: A cyberattack in June on Columbia University allowed hackers to access the sensitive personal information of more than 860,000 people. The breach exposed Social Security numbers, college application data, academic history, financial aid information, health insurance details, and more. The incident disrupted IT systems, causing outages and preventing students from accessing emails and assignment platforms. The hackers, identified as politically motivated, targeted student data to further their agenda. The stolen data was shared with major news outlets, leading to controversial reports. The university offered affected individuals two years of free credit monitoring services.

Ailogo

CUIMC Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for CUIMC

Incidents vs Hospitals and Health Care Industry Average (This Year)

No incidents recorded for Columbia University Irving Medical Center in 2026.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Columbia University Irving Medical Center in 2026.

Incident Types CUIMC vs Hospitals and Health Care Industry Avg (This Year)

No incidents recorded for Columbia University Irving Medical Center in 2026.

Incident History — CUIMC (X = Date, Y = Severity)

CUIMC cyber incidents detection timeline including parent company and subsidiaries

CUIMC Company Subsidiaries

SubsidiaryImage

Columbia University Irving Medical Center (CUIMC) is a clinical, research, and educational enterprise located on a campus in northern Manhattan. We are home to four professional colleges and schools that provide global leadership in scientific research, health and medical education, and patient care, including: - Vagelos College of Physicians and Surgeons - College of Dental Medicine - School of Nursing - Mailman School of Public Health Patient Care Columbia University Irving Medical Center (CUIMC) is a leader in providing comprehensive patient care and offers a range of general and specialized medical, dental, and nursing services. We have more than 1,800 physicians, surgeons, dentists, and nurses in locations throughout the New York City metro area. We know each patient is unique. Our knowledge of innovative treatments is enhanced by our compassion for patients and their families and a devotion to maintaining the highest standard of care.

Loading...
similarCompanies

CUIMC Similar Companies

UMass Memorial Health

UMass Memorial Health is the health and wellness partner of the people of Central Massachusetts. Through pain and pandemics, our commitment to our communities never wanes. We use knowledge and innovation to create breakthrough medicine, to create jobs, and to make life better for those we serve. We

City of Hope

City of Hope's mission is to deliver the cures of tomorrow to the people who need them today. Founded in 1913, City of Hope has grown into one of the largest cancer research and treatment organizations in the U.S. and one of the leading research centers for diabetes and other life-threatening illnes

Nationwide Children's Hospital

Nationwide Children’s is one of America's largest pediatric hospitals, an international leader in research and is ranked in all 10 specialties on U.S. News & World Report’s 2025-26 “America’s Best Children’s Hospitals” list. Our staff, comprised of 1,600 medical professionals and over 16,000 employe

Johns Hopkins Medicine

Johns Hopkins Medicine is a governing structure for the University’s School of Medicine and the health system, coordinating their research, teaching, patient care, and related enterprises. The Johns Hopkins Hospital opened in 1889, followed four years later by the university’s School of Medicine

Medical University of South Carolina

The Medical University of South Carolina (MUSC) is a public institution of higher learning the purpose of which is to preserve and optimize human life in South Carolina and beyond. The university provides an interprofessional environment for learning and discovery through education of health care p

UPMC is a world-renowned, nonprofit health care provider and insurer committed to delivering exceptional, people-centered care and community services. Headquartered in Pittsburgh and affiliated with the University of Pittsburgh Schools of the Health Sciences, UPMC is shaping the future of health thr

BayCare Health System

BayCare is a leading not-for-profit academic health care system that connects individuals and families to a wide range of services at 16 hospitals, including a children’s hospital, and hundreds of other convenient locations throughout the Tampa Bay and central Florida regions. The system is West Cen

Keralty

Anteriormente Organización Sanitas Internacional, Keralty es un grupo empresarial de valor en salud, con más de 40 años de experiencia conformado por empresas de aseguramiento y prestación de servicios de salud y una red propia hospitalaria y asistencial. También forman parte de Keralty institucio

Children's Healthcare of Atlanta

For more than 100 years, Children’s Healthcare of Atlanta has depended on clinical and nonclinical employees to help make kids better today and healthier tomorrow. Consistently ranked as one of the leading pediatric healthcare systems in the country by U.S. News & World Report, Children’s is the onl

newsone

CUIMC CyberSecurity News

January 13, 2026 04:03 PM
‘No shortage of wealth’: Mamdani, other Democrats chide NYC hospital executives over nurses’ strike

NYSNA nurses picket outside New York-Presbyterian's Columbia University Irving Medical Center in Manhattan.. | Ed Reed/Mayoral Photography...

December 20, 2025 08:00 AM
Princeton faces multiple lawsuits after disclosing cybersecurity breach involving student and alumni data

News News: Princeton University is facing three lawsuits after it disclosed a cybersecurity breach that raised concerns about how personal...

December 19, 2025 08:00 AM
Lawsuits filed against University after cybersecurity incidents

Multiple lawsuits have been filed against Princeton in the wake of a widespread cybersecurity breach.

September 24, 2025 07:00 AM
CUIMC pays $600K in data breach lawsuit settlement

The breach exposed the personal medical data of nearly 30,000 patients in 2023 and 2024, according to the settlement.

September 19, 2025 07:00 AM
Columbia University Health Care to Pay $600,000 to Settle Data Breach Lawsuit

Columbia University Health Care (CUHC) has agreed to pay $600000 to settle a class action lawsuit over a cybersecurity incident that...

September 10, 2025 07:00 AM
Meet the committee searching for Columbia’s 21st president

The search for Columbia's 21st University president has been ongoing for almost five months.

September 06, 2025 07:00 AM
Columbia University data breach hits 870,000 people

Columbia University confirms cyberattack compromising personal, financial and health data of 869000 students, employees and applicants after...

August 13, 2025 07:00 AM
Columbia University Data Breach Exposes Sensitive Info of 870,000 People

Columbia University, one of the most prestigious Ivy League institutions, has confirmed a major cybersecurity breach impacting 868,969...

August 12, 2025 07:00 AM
Columbia University Cyber Attack Compromised SSNs, Other Data

A data breach in June potentially affected nearly 870000 students, applicants and employees. Someone claiming to be the hacker told...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

CUIMC CyberSecurity History Information

Official Website of Columbia University Irving Medical Center

The official website of Columbia University Irving Medical Center is https://www.cuimc.columbia.edu/.

Columbia University Irving Medical Center’s AI-Generated Cybersecurity Score

According to Rankiteo, Columbia University Irving Medical Center’s AI-generated cybersecurity score is 654, reflecting their Weak security posture.

How many security badges does Columbia University Irving Medical Center’ have ?

According to Rankiteo, Columbia University Irving Medical Center currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Has Columbia University Irving Medical Center been affected by any supply chain cyber incidents ?

According to Rankiteo, Columbia University Irving Medical Center has been affected by a supply chain cyber incident involving OracleMed Health Investments (Pty) Ltd, with the incident ID COL1769038385.

Does Columbia University Irving Medical Center have SOC 2 Type 1 certification ?

According to Rankiteo, Columbia University Irving Medical Center is not certified under SOC 2 Type 1.

Does Columbia University Irving Medical Center have SOC 2 Type 2 certification ?

According to Rankiteo, Columbia University Irving Medical Center does not hold a SOC 2 Type 2 certification.

Does Columbia University Irving Medical Center comply with GDPR ?

According to Rankiteo, Columbia University Irving Medical Center is not listed as GDPR compliant.

Does Columbia University Irving Medical Center have PCI DSS certification ?

According to Rankiteo, Columbia University Irving Medical Center does not currently maintain PCI DSS compliance.

Does Columbia University Irving Medical Center comply with HIPAA ?

According to Rankiteo, Columbia University Irving Medical Center is not compliant with HIPAA regulations.

Does Columbia University Irving Medical Center have ISO 27001 certification ?

According to Rankiteo,Columbia University Irving Medical Center is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Columbia University Irving Medical Center

Columbia University Irving Medical Center operates primarily in the Hospitals and Health Care industry.

Number of Employees at Columbia University Irving Medical Center

Columbia University Irving Medical Center employs approximately 7,740 people worldwide.

Subsidiaries Owned by Columbia University Irving Medical Center

Columbia University Irving Medical Center presently has no subsidiaries across any sectors.

Columbia University Irving Medical Center’s LinkedIn Followers

Columbia University Irving Medical Center’s official LinkedIn profile has approximately 90,294 followers.

NAICS Classification of Columbia University Irving Medical Center

Columbia University Irving Medical Center is classified under the NAICS code 62, which corresponds to Health Care and Social Assistance.

Columbia University Irving Medical Center’s Presence on Crunchbase

No, Columbia University Irving Medical Center does not have a profile on Crunchbase.

Columbia University Irving Medical Center’s Presence on LinkedIn

Yes, Columbia University Irving Medical Center maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/columbiamed.

Cybersecurity Incidents Involving Columbia University Irving Medical Center

As of January 24, 2026, Rankiteo reports that Columbia University Irving Medical Center has experienced 2 cybersecurity incidents.

Number of Peer and Competitor Companies

Columbia University Irving Medical Center has an estimated 31,616 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Columbia University Irving Medical Center ?

Incident Types: The types of cybersecurity incidents that have occurred include Ransomware and Cyber Attack.

How does Columbia University Irving Medical Center detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an incident response plan activated with yes, and recovery measures with offering two years of free credit monitoring services, and communication strategy with established a toll-free assistance line (1-833-974-3375) for affected individuals..

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: Columbia University Cyberattack

Description: A cyberattack in June on Columbia University allowed hackers to access the sensitive personal information of more than 860,000 people.

Date Detected: 2023-06-24

Type: Data Breach

Threat Actor: Hacktivist with a political agenda

Motivation: To prove schools are not abiding by the Supreme Court decision in 2023 striking down affirmative action

Incident : Ransomware

Title: Columbia Medical Practice Hit by Qilin Ransomware Attack, Exposing Sensitive Data of 3,000 Patients

Description: Columbia Medical Practice, a multi-specialty healthcare provider based in Howard County, Maryland, suffered a ransomware attack on November 5, 2025, orchestrated by the Qilin ransomware group. The attackers infiltrated the organization’s network, encrypted files, and exfiltrated sensitive patient data before publicly claiming responsibility on the dark web on November 24, 2025. The breach was officially reported to the U.S. Department of Health and Human Services (HHS) on December 5, 2025, affecting approximately 3,000 individuals.

Date Detected: 2025-11-05

Date Publicly Disclosed: 2025-11-24

Type: Ransomware

Threat Actor: Qilin ransomware group

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach COL411080825

Data Compromised: Social Security numbers, contact details, demographic information, academic history, financial aid information, health insurance information

Systems Affected: IT systems, email accounts, assignment platforms, digital signs

Operational Impact: Widespread issues for students, inability to access email and assignment platforms

Brand Reputation Impact: Negative due to data breach and defaced digital signs

Identity Theft Risk: High

Incident : Ransomware COL1769038385

Data Compromised: Personally identifiable data, health records, financial and insurance data

Identity Theft Risk: Yes

Payment Information Risk: Yes

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Information, Personally Identifiable Information, Health Records, Financial And Insurance Data and .

Which entities were affected by each incident ?

Incident : Data Breach COL411080825

Entity Name: Columbia University

Entity Type: Educational Institution

Industry: Education

Location: New York, USA

Customers Affected: 868,969

Incident : Ransomware COL1769038385

Entity Name: Columbia Medical Practice

Entity Type: Healthcare Provider

Industry: Healthcare

Location: Howard County, Maryland, USA

Customers Affected: 3000

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Data Breach COL411080825

Incident Response Plan Activated: Yes

Recovery Measures: Offering two years of free credit monitoring services

Incident : Ransomware COL1769038385

Communication Strategy: Established a toll-free assistance line (1-833-974-3375) for affected individuals

What is the company's incident response plan?

Incident Response Plan: The company's incident response plan is described as Yes.

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach COL411080825

Type of Data Compromised: Personal Information

Number of Records Exposed: 868,969

Sensitivity of Data: High

Data Exfiltration: Yes

Personally Identifiable Information: Yes

Incident : Ransomware COL1769038385

Type of Data Compromised: Personally identifiable information, Health records, Financial and insurance data

Number of Records Exposed: 3000

Sensitivity of Data: High

Data Exfiltration: Yes

Data Encryption: Yes

Personally Identifiable Information: NamesAddressesSocial Security numbersDriver’s license detailsPassport details

Ransomware Information

Was ransomware involved in any of the incidents ?

Incident : Data Breach COL411080825

Data Exfiltration: Yes

Incident : Ransomware COL1769038385

Ransomware Strain: Qilin

Data Encryption: Yes

Data Exfiltration: Yes

How does the company recover data encrypted by ransomware ?

Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Offering two years of free credit monitoring services.

Regulatory Compliance

Were there any regulatory violations and fines imposed for each incident ?

Incident : Data Breach COL411080825

Regulatory Notifications: Filed breach notification documents with regulators in Maine and California

Incident : Ransomware COL1769038385

Regulations Violated: HIPAA,

Legal Actions: Potential legal claims being investigated by Shamis & Gentile P.A.

Regulatory Notifications: Reported to U.S. Department of Health and Human Services (HHS) on December 5, 2025

How does the company ensure compliance with regulatory requirements ?

Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Potential legal claims being investigated by Shamis & Gentile P.A..

References

Where can I find more information about each incident ?

Incident : Ransomware COL1769038385

Source: Incident report

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Incident report.

Investigation Status

What is the current status of the investigation for each incident ?

Incident : Data Breach COL411080825

Investigation Status: Ongoing

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Established a toll-free assistance line (1-833-974-3375) for affected individuals.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : Data Breach COL411080825

Customer Advisories: Offering two years of free credit monitoring services

Incident : Ransomware COL1769038385

Customer Advisories: Toll-free assistance line (1-833-974-3375) established for affected individuals

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Offering two years of free credit monitoring services and Toll-free assistance line (1-833-974-3375) established for affected individuals.

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : Data Breach COL411080825

High Value Targets: Student data

Data Sold on Dark Web: Student data

Additional Questions

General Information

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident were an Hacktivist with a political agenda and Qilin ransomware group.

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2023-06-24.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-11-24.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were Social Security numbers, contact details, demographic information, academic history, financial aid information, health insurance information, Personally identifiable data, health records and financial and insurance data.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Personally identifiable data, health records, financial and insurance data, Social Security numbers, contact details, demographic information, academic history, financial aid information and health insurance information.

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 869.3K.

Regulatory Compliance

What was the most significant legal action taken for a regulatory violation ?

Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Potential legal claims being investigated by Shamis & Gentile P.A..

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident is Incident report.

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.

Stakeholder and Customer Advisories

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued were an Offering two years of free credit monitoring services and Toll-free assistance line (1-833-974-3375) established for affected individuals.

cve

Latest Global CVEs (Not Company-Specific)

Description

Typemill is a flat-file, Markdown-based CMS designed for informational documentation websites. A reflected Cross-Site Scripting (XSS) exists in the login error view template `login.twig` of versions 2.19.1 and below. The `username` value can be echoed back without proper contextual encoding when authentication fails. An attacker can execute script in the login page context. This issue has been fixed in version 2.19.2.

Risk Information
cvss3
Base: 5.4
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Description

A DOM-based Cross-Site Scripting (XSS) vulnerability exists in the DomainCheckerApp class within domain/script.js of Sourcecodester Domain Availability Checker v1.0. The vulnerability occurs because the application improperly handles user-supplied data in the createResultElement method by using the unsafe innerHTML property to render domain search results.

Description

A Remote Code Execution (RCE) vulnerability exists in Sourcecodester Modern Image Gallery App v1.0 within the gallery/upload.php component. The application fails to properly validate uploaded file contents. Additionally, the application preserves the user-supplied file extension during the save process. This allows an unauthenticated attacker to upload arbitrary PHP code by spoofing the MIME type as an image, leading to full system compromise.

Description

A UNIX symbolic link following issue in the jailer component in Firecracker version v1.13.1 and earlier and 1.14.0 on Linux may allow a local host user with write access to the pre-created jailer directories to overwrite arbitrary host files via a symlink attack during the initialization copy at jailer startup, if the jailer is executed with root privileges. To mitigate this issue, users should upgrade to version v1.13.2 or 1.14.1 or above.

Risk Information
cvss3
Base: 6.0
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
cvss4
Base: 6.0
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

An information disclosure vulnerability exists in the /srvs/membersrv/getCashiers endpoint of the Aptsys gemscms backend platform thru 2025-05-28. This unauthenticated endpoint returns a list of cashier accounts, including names, email addresses, usernames, and passwords hashed using MD5. As MD5 is a broken cryptographic function, the hashes can be easily reversed using public tools, exposing user credentials in plaintext. This allows remote attackers to perform unauthorized logins and potentially gain access to sensitive POS operations or backend functions.

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=columbiamed' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge