Company Details
crrc-corporation-ltd
347
27,744
3365
crrcgc.cc
0
CRR_1370648
In-progress

CRRC Corporation Ltd. Company CyberSecurity Posture
crrcgc.ccCRRC undertakes design, manufacture, testing, commissioning and maintenance of locomotives and rolling stock, including: electric locomotives, diesel-electric and diesel-hydraulic locomotives from 280 kw to 10,000 kw for mainline and shunting duties; high-speed trains of speed over 350 km/h; DMUs and EMUs for urban, suburban and regional transport; trams and light rail vehicles; metro cars and passenger coaches; as well as full line of freight wagons, such as covered wagons; open-top wagons for coal, ore, steel and timber; hopper wagons for grain, ore, fertilizer; flat wagons; double-deck container flat wagons; tank wagons for all types of liquid and chemicals; tipper wagons, schnabel and depressed center wagons, as well as track machinery.
Company Details
crrc-corporation-ltd
347
27,744
3365
crrcgc.cc
0
CRR_1370648
In-progress
Between 700 and 749

CCL Global Score (TPRM)XXXX



No incidents recorded for CRRC Corporation Ltd. in 2025.
No incidents recorded for CRRC Corporation Ltd. in 2025.
No incidents recorded for CRRC Corporation Ltd. in 2025.
CCL cyber incidents detection timeline including parent company and subsidiaries

CRRC undertakes design, manufacture, testing, commissioning and maintenance of locomotives and rolling stock, including: electric locomotives, diesel-electric and diesel-hydraulic locomotives from 280 kw to 10,000 kw for mainline and shunting duties; high-speed trains of speed over 350 km/h; DMUs and EMUs for urban, suburban and regional transport; trams and light rail vehicles; metro cars and passenger coaches; as well as full line of freight wagons, such as covered wagons; open-top wagons for coal, ore, steel and timber; hopper wagons for grain, ore, fertilizer; flat wagons; double-deck container flat wagons; tank wagons for all types of liquid and chemicals; tipper wagons, schnabel and depressed center wagons, as well as track machinery.


At Lewis Bolt and Nut we are continuously working to take the railroad fastening industry to the next level by exceeding the expectations of our customers with top quality fastening products, the fastest service available, and knowledgeable, prompt communication. We strive to build products that im

Eta SP Engineers Pte Ltd is a Singaporean owned and managed company. Its roots may be traced back to 1993 when it was known as Eta SP. In 2013, we incorporated Eta SP Engineers Pte. Ltd. as a private limited company to grow the business further. We are able to provide a full suite of engineering se

Electric Motor Services, Inc. (or EMS) repairs, rebuilds, re-manufactures, and re-engineers all electro-mechanical rotating equipment and provides replacement services for rotating electrical equipment customers. The EMS facility is a fully integrated operation complete with teardown, cleaning, mach

Apex Rail Automation is a leader in delivering advanced rail automation solutions that enhance the efficiency, safety, and reliability of short lines, transit, industrials, and mainline railroad operations. We specialize in cutting-edge technologies, including remote-controlled TS4500 Power Switch m

At Recycling Consultants, we know there's a lot of hassle often associated with scrap. That's why we do everything we can to take those issues off your plate. Whether we're providing rail take-up, brokering your materials for the best price possible, or transporting your scrap off-site to the mill q

The Railway Shop – Industry Expertise, Quality Equipment At The Railway Shop, we’re more than just a supplier—we’re a trusted partner to the railway industry. Since 2015, we’ve been committed to delivering specialist, high-quality railway equipment with the expertise to match. With a team of indus
.png)
COMPETITION N on-opposition to a notified concentration (Case M.11870 - Igneo / Höegh Family Group / Larus) N on-opposition to.
After receiving the prototype coaches from China Railway Rolling Stock Corporation (CRRC), China, the Bengaluru Metro Rail Corporation...
Section 889 is a broad prohibition to the use of any covered Chinese technology posing a threat to US cybersecurity and national security.
The US Department of Defense blacklisted the rolling stock manufacturer and a number of other Chinese enterprises that it believes are fulfilling a defense...
Since 2014, the world's largest maker of freight wagons and passenger carriages has won US$2.6 billion in contracts in the United States but...
They're built in two U.S. factories by a company that's taking over the rail car industry worldwide.
By Alexandra Alper and Allison Lampert. (Reuters) - China's CRRC plans to bid on a big Washington D.C. subway project as it doubles down on...
Cybersecurity experts say a Chinese-government-run company could railroad the competition to build Metro's new rail car, then steal riders'...
Senators have taken the first steps to ban rolling stock manufactured by Chinese companies with state ties as part of the ongoing US-China trade war.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of CRRC Corporation Ltd. is https://www.crrcgc.cc/en.
According to Rankiteo, CRRC Corporation Ltd.’s AI-generated cybersecurity score is 749, reflecting their Moderate security posture.
According to Rankiteo, CRRC Corporation Ltd. currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, CRRC Corporation Ltd. is not certified under SOC 2 Type 1.
According to Rankiteo, CRRC Corporation Ltd. does not hold a SOC 2 Type 2 certification.
According to Rankiteo, CRRC Corporation Ltd. is not listed as GDPR compliant.
According to Rankiteo, CRRC Corporation Ltd. does not currently maintain PCI DSS compliance.
According to Rankiteo, CRRC Corporation Ltd. is not compliant with HIPAA regulations.
According to Rankiteo,CRRC Corporation Ltd. is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
CRRC Corporation Ltd. operates primarily in the Railroad Equipment Manufacturing industry.
CRRC Corporation Ltd. employs approximately 347 people worldwide.
CRRC Corporation Ltd. presently has no subsidiaries across any sectors.
CRRC Corporation Ltd.’s official LinkedIn profile has approximately 27,744 followers.
CRRC Corporation Ltd. is classified under the NAICS code 3365, which corresponds to Railroad Rolling Stock Manufacturing.
No, CRRC Corporation Ltd. does not have a profile on Crunchbase.
Yes, CRRC Corporation Ltd. maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/crrc-corporation-ltd.
As of November 27, 2025, Rankiteo reports that CRRC Corporation Ltd. has not experienced any cybersecurity incidents.
CRRC Corporation Ltd. has an estimated 275 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, CRRC Corporation Ltd. has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.