ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Deutsche Bank is the leading German bank with strong European roots and a global network. The bank focuses on its strengths in a Corporate Bank newly created in 2019, a leading Private Bank, a focused investment bank and in asset management. We provide financial services to companies, governments, institutional investors, small and medium-sized businesses and private individuals. Deutsche Bank was founded in 1870 to accompany German businesses into the world, and has worked across borders ever since. Useful links: Jobs https://www.db.com/careers. Netiquette at https://www.db.com/netiquette. Data protection policy https://www.db.com/DataProtection. Imprint https://www.db.com/imprint.

Deutsche Bank A.I CyberSecurity Scoring

Deutsche Bank

Company Details

Linkedin ID:

deutsche-bank

Employees number:

74,237

Number of followers:

2,732,266

NAICS:

52

Industry Type:

Financial Services

Homepage:

db.com

IP Addresses:

0

Company ID:

DEU_9053595

Scan Status:

In-progress

AI scoreDeutsche Bank Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/deutsche-bank.jpeg
Deutsche Bank Financial Services
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreDeutsche Bank Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/deutsche-bank.jpeg
Deutsche Bank Financial Services
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Deutsche Bank Company CyberSecurity News & History

Past Incidents
3
Attack Types
2
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
Deutsche BankBreach2516/2023
Rankiteo Explanation :
Attack without any consequences

Description: A former Computacenter manager has filed suit alleging that unauthorized parties repeatedly accessed Deutsche Bank’s high-security New York datacenter between March and June 2023. Court documents claim that a Computacenter employee allowed his uncredentialed girlfriend into server rooms housing critical mainframe systems, while internal CCTV footage reportedly shows Deutsche Bank’s own security staff permitting her entry. During these breaches, she allegedly connected a personal laptop to the bank network and may have circumvented the SIEM monitoring environment. Despite reporting these lapses and urging a regulatory disclosure, the whistleblower was suspended and ultimately terminated. No confirmed data exfiltration or operational outage has been documented, but the incidents exposed serious lapses in multi-layered physical and logical controls, exposing the institution to heightened regulatory, legal and reputational risk. The lawsuit seeks over $20 million in damages under New York whistleblower protections and highlights the potential downstream costs of litigation, internal investigations and remediation measures to shore up security protocols.

Deutsche BankBreach100511/2022
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: An initial access broker hacked multinational investment bank Deutsche Bank and offered access to its systems for sale on Telegram. The IAB claims to have access to around 21000 machines in the bank’s network, most of which are Windows systems. The breacher had access to the chat services used for internal communications. He also claimed to have access to file servers containing 16 terabytes of data.

Deutsche BankData Leak60307/2023
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: Customers of Deutsche Bank and its subsidiary Postbank are affected by the incident, and the bank has alerted an unspecified number of clients that their data may have been stolen. The institute declared that an external service provider's data loss was the thieves' entry point. The service provider found the root of the security breach and fixed it. A software vulnerability has been exploited, according to a letter sent to the affected clients. The bank refrained from identifying the service provider who let the data leak happen. Other banks and their customers may also be impacted because account-switching service providers frequently work with several banks.

Deutsche Bank
Breach
Severity: 25
Impact: 1
Seen: 6/2023
Blog:
Rankiteo Explanation
Attack without any consequences

Description: A former Computacenter manager has filed suit alleging that unauthorized parties repeatedly accessed Deutsche Bank’s high-security New York datacenter between March and June 2023. Court documents claim that a Computacenter employee allowed his uncredentialed girlfriend into server rooms housing critical mainframe systems, while internal CCTV footage reportedly shows Deutsche Bank’s own security staff permitting her entry. During these breaches, she allegedly connected a personal laptop to the bank network and may have circumvented the SIEM monitoring environment. Despite reporting these lapses and urging a regulatory disclosure, the whistleblower was suspended and ultimately terminated. No confirmed data exfiltration or operational outage has been documented, but the incidents exposed serious lapses in multi-layered physical and logical controls, exposing the institution to heightened regulatory, legal and reputational risk. The lawsuit seeks over $20 million in damages under New York whistleblower protections and highlights the potential downstream costs of litigation, internal investigations and remediation measures to shore up security protocols.

Deutsche Bank
Breach
Severity: 100
Impact: 5
Seen: 11/2022
Blog:
Rankiteo Explanation
Attack threatening the organization’s existence

Description: An initial access broker hacked multinational investment bank Deutsche Bank and offered access to its systems for sale on Telegram. The IAB claims to have access to around 21000 machines in the bank’s network, most of which are Windows systems. The breacher had access to the chat services used for internal communications. He also claimed to have access to file servers containing 16 terabytes of data.

Deutsche Bank
Data Leak
Severity: 60
Impact: 3
Seen: 07/2023
Blog:
Rankiteo Explanation
Attack with significant impact with internal employee data leaks

Description: Customers of Deutsche Bank and its subsidiary Postbank are affected by the incident, and the bank has alerted an unspecified number of clients that their data may have been stolen. The institute declared that an external service provider's data loss was the thieves' entry point. The service provider found the root of the security breach and fixed it. A software vulnerability has been exploited, according to a letter sent to the affected clients. The bank refrained from identifying the service provider who let the data leak happen. Other banks and their customers may also be impacted because account-switching service providers frequently work with several banks.

Ailogo

Deutsche Bank Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Deutsche Bank

Incidents vs Financial Services Industry Average (This Year)

No incidents recorded for Deutsche Bank in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Deutsche Bank in 2025.

Incident Types Deutsche Bank vs Financial Services Industry Avg (This Year)

No incidents recorded for Deutsche Bank in 2025.

Incident History — Deutsche Bank (X = Date, Y = Severity)

Deutsche Bank cyber incidents detection timeline including parent company and subsidiaries

Deutsche Bank Company Subsidiaries

SubsidiaryImage

Deutsche Bank is the leading German bank with strong European roots and a global network. The bank focuses on its strengths in a Corporate Bank newly created in 2019, a leading Private Bank, a focused investment bank and in asset management. We provide financial services to companies, governments, institutional investors, small and medium-sized businesses and private individuals. Deutsche Bank was founded in 1870 to accompany German businesses into the world, and has worked across borders ever since. Useful links: Jobs https://www.db.com/careers. Netiquette at https://www.db.com/netiquette. Data protection policy https://www.db.com/DataProtection. Imprint https://www.db.com/imprint.

Loading...
similarCompanies

Deutsche Bank Similar Companies

Wells Fargo

Wells Fargo & Company (NYSE: WFC) is a diversified, community-based financial services company with approximately $1.9 trillion in assets. Wells Fargo’s vision is to satisfy our customers’ financial needs and help them succeed financially. Founded in 1852 and headquartered in San Francisco, Wells Fa

Revolut

People deserve more from their money. More visibility, more control, and more freedom. Since 2015, Revolut has been on a mission to deliver just that. Our powerhouse of products help our 50+ million customers get more from their money every day. As we continue our lightning-fast growth,‌ 2 things a

We exist to shape decisions for the better — to protect and enrich the lives of people around the world. Through actionable analytic insight, globally integrated Risk Capital and Human Capital expertise, and locally relevant solutions, our colleagues provide clients in over 120 countries with the cl

IFC - International Finance Corporation

IFC, a member of the World Bank Group, is the largest global development institution focused exclusively on the private sector in developing countries. We utilize and leverage our products and services—as well as products and services of other institutions in the World Bank Group—to provide develop

Navy Federal Credit Union

Navy Federal is the world’s largest credit union, with more than 14 million members, $180 billion+ in assets and 24,000+ employees. Throughout campuses in Vienna, VA Pensacola, FL and Winchester, VA, as well as more than 360 branches, we serve the Armed Forces, Department of Defense, Veterans and th

Western Union

Many know us as the most trusted way to send money to friends and family overseas and across borders, but we're much more than that. Our talented teams around the world are building new ways to send, save and spend money. Wherever you are in the world, in whatever currency you choose, we're evolvi

Ally Financial Inc. (NYSE: ALLY) is a leading digital financial services company and a top 25 U.S. financial holding company offering financial products for consumers, businesses, automotive dealers and corporate clients. NMLS #3015 | #181005 | https://www.nmlsconsumeraccess.org/ Ally's legacy da

Swedbank

Since 1820, Swedbank has been the bank for the many households and businesses. We are a modern financial services platform focused on customer satisfaction. Our goal is to encourage people to save for a better future, and we aim to help people, businesses and society to grow by promoting a healthy a

Somos el grupo financiero líder en el Perú con una vasta experiencia en el mercado peruano. Contamos con una sólida plataforma de Banca Comercial reforzada por una importante presencia en Banca de Inversión en Latinoamérica destinada a desarrollar el potencial de la región y acompañar a nuestros cli

newsone

Deutsche Bank CyberSecurity News

October 30, 2025 07:00 AM
2026 banking and capital markets outlook

2026 is pivotal for US banks as they navigate macro headwinds, stablecoin disruption, scaling AI, fragmented data, and financial crime.

October 15, 2025 07:00 AM
Mastercard Europe brings multi-sector cyber defense exercise to Europe for the first time

Cross-sector teams from BT Group, Deutsche Bank, ING, Proximus and Santander join Mastercard's European Cyber Resilience Centre in Belgium...

October 01, 2025 07:00 AM
Sibos 2025: Cybersecurity, AI and quantum dominate industry panel

At Sibos 2025 in Frankfurt, experts spanning multinational banks and fintechs explored the emergence of sophisticated cyberthreats.

September 24, 2025 07:00 AM
JPMorgan hired a new cybersecurity chief from Goldman Sachs' investment bank

Multiple banks have been recruiting senior cybersecurity specialists as technologies like AI make cyberattacks much more powerful. Bank of...

September 22, 2025 11:32 AM
The AI dilemma: friend or foe?

The use of AI is on the rise and when it comes to cyber security, we face advantages as well as fraud or the spread of misinformation.

August 13, 2025 03:01 PM
Deutsche Bank Backs Palo Alto Networks’ $25 Billion CyberArk Deal

Deutsche Bank upgraded Palo Alto Networks, calling its business healthy and the CyberArk buyout a smart move for future growth.

August 13, 2025 07:00 AM
Deutsche Bank upgrades Palo Alto on growth, CyberArk deal potential

Investing.com -- Deutsche Bank upgraded Palo Alto Networks to Buy from Hold and raised its price target to $220, saying investor concerns...

July 10, 2025 07:00 AM
Deutsche Bank Launches Instant Cash Reporting

Deutsche Bank has gone live with Swift's Instant Cash Reporting (ICR) – a new, API-driven solution that enables large corporate and...

May 22, 2025 07:00 AM
How banks can fight the rising tide of data breaches in 2025

Hackers using artificial intelligence and other tools are putting a greater strain on banks' cybersecurity systems, and other institutions...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Deutsche Bank CyberSecurity History Information

Official Website of Deutsche Bank

The official website of Deutsche Bank is https://www.db.com.

Deutsche Bank’s AI-Generated Cybersecurity Score

According to Rankiteo, Deutsche Bank’s AI-generated cybersecurity score is 750, reflecting their Fair security posture.

How many security badges does Deutsche Bank’ have ?

According to Rankiteo, Deutsche Bank currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Deutsche Bank have SOC 2 Type 1 certification ?

According to Rankiteo, Deutsche Bank is not certified under SOC 2 Type 1.

Does Deutsche Bank have SOC 2 Type 2 certification ?

According to Rankiteo, Deutsche Bank does not hold a SOC 2 Type 2 certification.

Does Deutsche Bank comply with GDPR ?

According to Rankiteo, Deutsche Bank is not listed as GDPR compliant.

Does Deutsche Bank have PCI DSS certification ?

According to Rankiteo, Deutsche Bank does not currently maintain PCI DSS compliance.

Does Deutsche Bank comply with HIPAA ?

According to Rankiteo, Deutsche Bank is not compliant with HIPAA regulations.

Does Deutsche Bank have ISO 27001 certification ?

According to Rankiteo,Deutsche Bank is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Deutsche Bank

Deutsche Bank operates primarily in the Financial Services industry.

Number of Employees at Deutsche Bank

Deutsche Bank employs approximately 74,237 people worldwide.

Subsidiaries Owned by Deutsche Bank

Deutsche Bank presently has no subsidiaries across any sectors.

Deutsche Bank’s LinkedIn Followers

Deutsche Bank’s official LinkedIn profile has approximately 2,732,266 followers.

NAICS Classification of Deutsche Bank

Deutsche Bank is classified under the NAICS code 52, which corresponds to Finance and Insurance.

Deutsche Bank’s Presence on Crunchbase

Yes, Deutsche Bank has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/deutsche-bank.

Deutsche Bank’s Presence on LinkedIn

Yes, Deutsche Bank maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/deutsche-bank.

Cybersecurity Incidents Involving Deutsche Bank

As of December 10, 2025, Rankiteo reports that Deutsche Bank has experienced 3 cybersecurity incidents.

Number of Peer and Competitor Companies

Deutsche Bank has an estimated 30,304 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Deutsche Bank ?

Incident Types: The types of cybersecurity incidents that have occurred include Data Leak and Breach.

How does Deutsche Bank detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an communication strategy with alerted affected clients, and remediation measures with remediation measures to shore up security protocols..

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: Deutsche Bank Systems Access Offered for Sale by Initial Access Broker

Description: An initial access broker hacked multinational investment bank Deutsche Bank and offered access to its systems for sale on Telegram.

Type: Data Breach

Attack Vector: Initial Access Broker

Threat Actor: Initial Access Broker

Motivation: Financial Gain

Incident : Data Breach

Title: Deutsche Bank and Postbank Data Breach

Description: Customers of Deutsche Bank and its subsidiary Postbank are affected by a data breach due to a vulnerability in an external service provider's software.

Type: Data Breach

Attack Vector: Exploitation of Software Vulnerability

Vulnerability Exploited: Software Vulnerability

Incident : Physical and Logical Security Breach

Title: Unauthorized Access at Deutsche Bank's New York Datacenter

Description: A former Computacenter manager has filed suit alleging that unauthorized parties repeatedly accessed Deutsche Bank’s high-security New York datacenter between March and June 2023. Court documents claim that a Computacenter employee allowed his uncredentialed girlfriend into server rooms housing critical mainframe systems, while internal CCTV footage reportedly shows Deutsche Bank’s own security staff permitting her entry. During these breaches, she allegedly connected a personal laptop to the bank network and may have circumvented the SIEM monitoring environment. Despite reporting these lapses and urging a regulatory disclosure, the whistleblower was suspended and ultimately terminated. No confirmed data exfiltration or operational outage has been documented, but the incidents exposed serious lapses in multi-layered physical and logical controls, exposing the institution to heightened regulatory, legal and reputational risk. The lawsuit seeks over $20 million in damages under New York whistleblower protections and highlights the potential downstream costs of litigation, internal investigations and remediation measures to shore up security protocols.

Date Detected: March 2023

Type: Physical and Logical Security Breach

Attack Vector: Physical AccessLogical Access

Vulnerability Exploited: Unauthorized physical accessUnauthorized network access

Threat Actor: Unauthorized individual (uncredentialed girlfriend of a Computacenter employee)

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Breach.

How does the company identify the attack vectors used in incidents ?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through External Service Provider and Physical access to server rooms.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach DEU23291222

Data Compromised: Internal communications, File servers containing 16 terabytes of data

Systems Affected: 21000 machinesWindows systemsChat services

Incident : Data Breach DEU225723723

Data Compromised: Customer Data

Incident : Physical and Logical Security Breach DEU843050725

Systems Affected: Critical mainframe systems

Brand Reputation Impact: Heightened reputational risk

Legal Liabilities: Heightened legal risk

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Internal Communications, File Server Data, and Customer Data.

Which entities were affected by each incident ?

Incident : Data Breach DEU23291222

Entity Name: Deutsche Bank

Entity Type: Multinational Investment Bank

Industry: Financial Services

Incident : Data Breach DEU225723723

Entity Name: Deutsche Bank

Entity Type: Bank

Industry: Financial Services

Incident : Data Breach DEU225723723

Entity Name: Postbank

Entity Type: Bank

Industry: Financial Services

Incident : Physical and Logical Security Breach DEU843050725

Entity Name: Deutsche Bank

Entity Type: Financial Institution

Industry: Banking

Location: New York

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Data Breach DEU225723723

Communication Strategy: Alerted affected clients

Incident : Physical and Logical Security Breach DEU843050725

Remediation Measures: Remediation measures to shore up security protocols

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach DEU23291222

Type of Data Compromised: Internal communications, File server data

Incident : Data Breach DEU225723723

Type of Data Compromised: Customer Data

Incident : Physical and Logical Security Breach DEU843050725

Data Exfiltration: No confirmed data exfiltration

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Remediation measures to shore up security protocols.

Regulatory Compliance

Were there any regulatory violations and fines imposed for each incident ?

Incident : Physical and Logical Security Breach DEU843050725

Legal Actions: Lawsuit seeking over $20 million in damages

How does the company ensure compliance with regulatory requirements ?

Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Lawsuit seeking over $20 million in damages.

References

Where can I find more information about each incident ?

Incident : Physical and Logical Security Breach DEU843050725

Source: Court documents

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Court documents.

Investigation Status

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Alerted affected clients.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : Data Breach DEU225723723

Customer Advisories: Letter sent to affected clients

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Letter sent to affected clients.

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : Data Breach DEU225723723

Entry Point: External Service Provider

Incident : Physical and Logical Security Breach DEU843050725

Entry Point: Physical access to server rooms

High Value Targets: Critical mainframe systems

Data Sold on Dark Web: Critical mainframe systems

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : Data Breach DEU225723723

Root Causes: Software Vulnerability

Corrective Actions: Fixed the vulnerability

Incident : Physical and Logical Security Breach DEU843050725

Root Causes: Lapses In Multi-Layered Physical And Logical Controls,

What corrective actions has the company taken based on post-incident analysis ?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Fixed the vulnerability.

Additional Questions

General Information

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident were an Initial Access Broker and Unauthorized individual (uncredentialed girlfriend of a Computacenter employee).

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on March 2023.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were Internal communications, File servers containing 16 terabytes of data, and Customer Data.

What was the most significant system affected in an incident ?

Most Significant System Affected: The most significant system affected in an incident was 21000 machinesWindows systemsChat services and .

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Customer Data, File servers containing 16 terabytes of data and Internal communications.

Regulatory Compliance

What was the most significant legal action taken for a regulatory violation ?

Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Lawsuit seeking over $20 million in damages.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident is Court documents.

Stakeholder and Customer Advisories

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued was an Letter sent to affected clients.

Initial Access Broker

What was the most recent entry point used by an initial access broker ?

Most Recent Entry Point: The most recent entry point used by an initial access broker were an External Service Provider and Physical access to server rooms.

Post-Incident Analysis

What was the most significant root cause identified in post-incident analysis ?

Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Software Vulnerability, Lapses in multi-layered physical and logical controls.

What was the most significant corrective action taken based on post-incident analysis ?

Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Fixed the vulnerability.

cve

Latest Global CVEs (Not Company-Specific)

Description

WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. Versions 3.5.4 and below contain a Stored Cross-Site Scripting (XSS) vulnerability in the /WeGIA/html/geral/configurar_senhas.php endpoint. The application does not sanitize user-controlled data before rendering it inside the employee selection dropdown. The application retrieves employee names from the database and injects them directly into HTML <option> elements without proper escaping. This issue is fixed in version 3.5.5.

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

ZITADEL is an open-source identity infrastructure tool. Versions 4.0.0-rc.1 through 4.7.0 are vulnerable to DOM-Based XSS through the Zitadel V2 logout endpoint. The /logout endpoint insecurely routes to a value that is supplied in the post_logout_redirect GET parameter. As a result, unauthenticated remote attacker can execute malicious JS code on Zitadel users’ browsers. To carry out an attack, multiple user sessions need to be active in the same browser, however, account takeover is mitigated when using Multi-Factor Authentication (MFA) or Passwordless authentication. This issue is fixed in version 4.7.1.

Risk Information
cvss3
Base: 8.0
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
Description

ZITADEL is an open-source identity infrastructure tool. Versions 4.7.0 and below are vulnerable to an unauthenticated, full-read SSRF vulnerability. The ZITADEL Login UI (V2) treats the x-zitadel-forward-host header as a trusted fallback for all deployments, including self-hosted instances. This allows an unauthenticated attacker to force the server to make HTTP requests to arbitrary domains, such as internal addresses, and read the responses, enabling data exfiltration and bypassing network-segmentation controls. This issue is fixed in version 4.7.1.

Risk Information
cvss3
Base: 9.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N
Description

NiceGUI is a Python-based UI framework. Versions 3.3.1 and below are vulnerable to directory traversal through the App.add_media_files() function, which allows a remote attacker to read arbitrary files on the server filesystem. This issue is fixed in version 3.4.0.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Description

FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions are vulnerable to authentication bypass when the authentication type is set to "webserver." When providing an Authorization header with an arbitrary value, a session is associated with the target user regardless of valid credentials. This issue is fixed in versions 16.0.44 and 17.0.23.

Risk Information
cvss4
Base: 9.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=deutsche-bank' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge