Comparison Overview

Commerzbank AG

VS

Abbey

Commerzbank AG

Kaiserstraße 16, Frankfurt am Main, Hessen, DE, 60311
Last Update: 2025-12-09
Between 800 and 849

Commerzbank is the leading bank for the German Mittelstand and a strong partner for around 24,000 corporate client groups. In addition, it supports private and small-business customers in Germany with more than €400 billion assets under management. The Bank’s two Business Segments – Private and Small-Business Customers and Corporate Clients – offer a comprehensive portfolio of financial services. Commerzbank transacts approximately 30% of Germany’s foreign trade and is present internationally in more than 40 countries in the corporate clients’ business. The Bank focusses on the German Mittelstand, large corporates, and institutional clients. As part of its international business, Commerzbank supports clients with a business relationship to Germany, Austria, or Switzerland and companies operating in selected future-oriented industries. In the Private and Small-Business Customers segment, the Bank is at the side of its customers with its brands Commerzbank and comdirect: online and mobile, in the advisory centre, and personally in its branches. Its Polish subsidiary mBank S.A. is an innovative digital bank that serves approximately 5.7 million private and corporate customers, predominantly in Poland, as well as in the Czech Republic and Slovakia.

NAICS: 52211
NAICS Definition: Commercial Banking
Employees: 9,623
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Abbey

Last Update: 2025-12-09
Between 750 and 799

Abbey National plc is the 6th biggest UK bank with 705 branches under the Abbey brand. It also uses the Cahoot and since September 2008, the Bradford and Bingley savings brands. Subsidiary banks include Cater Allen Limited. Since 2004 Abbey has been part of the Santander group. Santander is the largest Eurozone Financial Services company. Recent Santander acquisitions include UK Bank Alliance and Leicester.

NAICS: 522
NAICS Definition:
Employees: 10,001
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/commerzbank-ag.jpeg
Commerzbank AG
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/abbey.jpeg
Abbey
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Commerzbank AG
100%
Compliance Rate
0/4 Standards Verified
Abbey
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Banking Industry Average (This Year)

No incidents recorded for Commerzbank AG in 2025.

Incidents vs Banking Industry Average (This Year)

No incidents recorded for Abbey in 2025.

Incident History — Commerzbank AG (X = Date, Y = Severity)

Commerzbank AG cyber incidents detection timeline including parent company and subsidiaries

Incident History — Abbey (X = Date, Y = Severity)

Abbey cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/commerzbank-ag.jpeg
Commerzbank AG
Incidents

No Incident

https://images.rankiteo.com/companyimages/abbey.jpeg
Abbey
Incidents

No Incident

FAQ

Commerzbank AG company demonstrates a stronger AI Cybersecurity Score compared to Abbey company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Abbey company has disclosed a higher number of cyber incidents compared to Commerzbank AG company.

In the current year, Abbey company and Commerzbank AG company have not reported any cyber incidents.

Neither Abbey company nor Commerzbank AG company has reported experiencing a ransomware attack publicly.

Neither Abbey company nor Commerzbank AG company has reported experiencing a data breach publicly.

Neither Abbey company nor Commerzbank AG company has reported experiencing targeted cyberattacks publicly.

Neither Commerzbank AG company nor Abbey company has reported experiencing or disclosing vulnerabilities publicly.

Neither Commerzbank AG nor Abbey holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Commerzbank AG company nor Abbey company has publicly disclosed detailed information about the number of their subsidiaries.

Abbey company employs more people globally than Commerzbank AG company, reflecting its scale as a Banking.

Neither Commerzbank AG nor Abbey holds SOC 2 Type 1 certification.

Neither Commerzbank AG nor Abbey holds SOC 2 Type 2 certification.

Neither Commerzbank AG nor Abbey holds ISO 27001 certification.

Neither Commerzbank AG nor Abbey holds PCI DSS certification.

Neither Commerzbank AG nor Abbey holds HIPAA certification.

Neither Commerzbank AG nor Abbey holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 2.6
Severity: HIGH
AV:N/AC:H/Au:N/C:N/I:P/A:N
cvss3
Base: 3.7
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss4
Base: 6.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X