Comparison Overview

Dassault Aviation

VS

Safran

Dassault Aviation

78, Quai Marcel Dassault, Saint-Cloud, 92210, FR
Last Update: 2025-12-10

Dassault Aviation is a French aerospace company that shapes the future by designing and building military aircraft, business jets and space systems. Leader on the New Generation Fighter developed within the joint European program FCAS (Future Combat Air System) Designer and manufacturer of the Rafale multirole fighter, capable of handling all types of missions for both air forces and naval air arms Designer of the nEUROn combat drone, built by a European partnership Designer and manufacturer of the Falcon family of business jets, recognized for their handling qualities, operational flexibility, low fuel consumption and innovative solutions Designer and manufacturer of special Falcons for maritime surveillance, intelligence or medical evacuation missions The hub of a strategic industrial network comprising hundreds of companies in France and international markets Core shareholder in Thales Expertise in a number of technologies that are key to strategic autonomy Pioneer in digital technologies and behind CATIA™, the 3D CAD/CAM system that has become a global standard Creator of more than 100 prototypes in the last century, with over 10,000 aircraft delivered to 90 countries 2,100 Falcon jets in service 1,000 military aircraft in service 12,371 employees, of which 78% in France

NAICS: 3364
NAICS Definition: Aerospace Product and Parts Manufacturing
Employees: 7,102
Subsidiaries: 1
12-month incidents
0
Known data breaches
0
Attack type number
0

Safran

2, Boulevard du général Martial Valin, Paris, FR, 75015
Last Update: 2025-12-09
Between 800 and 849

Safran is an international high-technology group, operating in the aviation (propulsion, equipment and interiors), defense and space markets. Its core purpose is to contribute to a safer, more sustainable world, where air transport is more environmentally friendly, comfortable and accessible. Safran has a global presence, with 79,000 employees and holds, alone or in partnership, world or European leadership positions in its core markets.

NAICS: 3364
NAICS Definition: Aerospace Product and Parts Manufacturing
Employees: 57,921
Subsidiaries: 7
12-month incidents
0
Known data breaches
0
Attack type number
1

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/dassault-aviation.jpeg
Dassault Aviation
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/safran.jpeg
Safran
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Dassault Aviation
100%
Compliance Rate
0/4 Standards Verified
Safran
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Aviation and Aerospace Component Manufacturing Industry Average (This Year)

No incidents recorded for Dassault Aviation in 2025.

Incidents vs Aviation and Aerospace Component Manufacturing Industry Average (This Year)

No incidents recorded for Safran in 2025.

Incident History — Dassault Aviation (X = Date, Y = Severity)

Dassault Aviation cyber incidents detection timeline including parent company and subsidiaries

Incident History — Safran (X = Date, Y = Severity)

Safran cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/dassault-aviation.jpeg
Dassault Aviation
Incidents

No Incident

https://images.rankiteo.com/companyimages/safran.jpeg
Safran
Incidents

Date Detected: 03/2023
Type:Data Leak
Attack Vector: Misconfiguration
Blog: Blog

FAQ

Safran company demonstrates a stronger AI Cybersecurity Score compared to Dassault Aviation company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Safran company has historically faced a number of disclosed cyber incidents, whereas Dassault Aviation company has not reported any.

In the current year, Safran company and Dassault Aviation company have not reported any cyber incidents.

Neither Safran company nor Dassault Aviation company has reported experiencing a ransomware attack publicly.

Neither Safran company nor Dassault Aviation company has reported experiencing a data breach publicly.

Neither Safran company nor Dassault Aviation company has reported experiencing targeted cyberattacks publicly.

Neither Dassault Aviation company nor Safran company has reported experiencing or disclosing vulnerabilities publicly.

Neither Dassault Aviation nor Safran holds any compliance certifications.

Neither company holds any compliance certifications.

Safran company has more subsidiaries worldwide compared to Dassault Aviation company.

Safran company employs more people globally than Dassault Aviation company, reflecting its scale as a Aviation and Aerospace Component Manufacturing.

Neither Dassault Aviation nor Safran holds SOC 2 Type 1 certification.

Neither Dassault Aviation nor Safran holds SOC 2 Type 2 certification.

Neither Dassault Aviation nor Safran holds ISO 27001 certification.

Neither Dassault Aviation nor Safran holds PCI DSS certification.

Neither Dassault Aviation nor Safran holds HIPAA certification.

Neither Dassault Aviation nor Safran holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 2.6
Severity: HIGH
AV:N/AC:H/Au:N/C:N/I:P/A:N
cvss3
Base: 3.7
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss4
Base: 6.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X