Badge
11,371 badges added since 01 January 2025
ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Grafana Labs, the company behind the open observability cloud, is founded on the principles of open source, open standards, open ecosystems, and open culture. Grafana Cloud, our fully managed observability platform, is flexible and built for scale, enabling organizations to see, understand, and act on all their disparate data so they can move at the speed of their ambitions. Today, more than 25 million users and 7,000+ customers – including Anthropic, Bloomberg, NVIDIA, Microsoft, and Salesforce – trust Grafana Labs to ensure reliability of their applications and systems, resolve incidents quickly, and optimize their telemetry to reduce noise and cost. We are a 100% remote company with 1,400+ team members across 40+ countries, and we’re backed by leading investors including Lightspeed Venture Partners, Sequoia Capital, GIC, Coatue, J.P. Morgan, CapitalG, and Lead Edge Capital. Follow Grafana Labs on LinkedIn and Twitter or visit grafana.com.

Grafana Labs A.I CyberSecurity Scoring

Grafana Labs

Company Details

Linkedin ID:

grafana-labs

Employees number:

1,772

Number of followers:

258,334

NAICS:

5112

Industry Type:

Software Development

Homepage:

grafana.com

IP Addresses:

0

Company ID:

GRA_1527465

Scan Status:

In-progress

AI scoreGrafana Labs Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/grafana-labs.jpeg
Grafana Labs Software Development
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreGrafana Labs Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/grafana-labs.jpeg
Grafana Labs Software Development
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Grafana Labs Company CyberSecurity News & History

Past Incidents
2
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsSupply Chain SourceIncident DetailsView
Grafana LabsVulnerability85411/2025NA
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Grafana Labs disclosed a critical vulnerability (CVE-2025-41115) in its Grafana Enterprise product, enabling privilege escalation or impersonation of administrators when SCIM provisioning is misconfigured. The flaw arises from improper mapping of the `externalId` SCIM attribute to Grafana’s internal `user.uid`, allowing attackers to assign numeric IDs (e.g., `"1"`) to provisioned users, effectively granting them admin-level access. While exploitation requires both `enableSCIM` and `user_sync_enabled` to be active a feature in *Public Preview* the risk is severe due to Grafana’s widespread use across enterprises for data visualization and monitoring.The vulnerability affects versions 12.0.0 to 12.2.1 (excluding OSS and patched Cloud services). Grafana Labs confirmed no active exploitation in its Cloud environment but urged self-managed users to upgrade to versions 12.3.0, 12.2.1, 12.1.3, or 12.0.6 or disable SCIM. The flaw was internally discovered on November 4, patched within 24 hours, and publicly disclosed on November 19. Prior scanning activity for older Grafana flaws (e.g., path traversal) suggests potential reconnaissance for targeting this new vulnerability.Failure to patch could allow attackers to compromise administrative accounts, leading to unauthorized dashboard access, data manipulation, or lateral movement within enterprise networks. Given Grafana’s role in operational analytics, exploitation could disrupt monitoring, alerting, or compliance reporting, with cascading effects on security posture and incident response.

Grafana LabsVulnerability8545/2025NA
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: More than 46,000 internet-facing Grafana instances remain unpatched and exposed to a client-side open redirect vulnerability that allows executing a malicious plugin and account takeover. The flaw, tracked as CVE-2025-4123, impacts multiple versions of the open-source platform used for monitoring and visualizing infrastructure and application metrics. Despite security updates released on May 21, a significant number of instances remain vulnerable, posing a risk to user sessions and account credentials.

Grafana Labs
Vulnerability
Severity: 85
Impact: 4
Seen: 11/2025
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Grafana Labs disclosed a critical vulnerability (CVE-2025-41115) in its Grafana Enterprise product, enabling privilege escalation or impersonation of administrators when SCIM provisioning is misconfigured. The flaw arises from improper mapping of the `externalId` SCIM attribute to Grafana’s internal `user.uid`, allowing attackers to assign numeric IDs (e.g., `"1"`) to provisioned users, effectively granting them admin-level access. While exploitation requires both `enableSCIM` and `user_sync_enabled` to be active a feature in *Public Preview* the risk is severe due to Grafana’s widespread use across enterprises for data visualization and monitoring.The vulnerability affects versions 12.0.0 to 12.2.1 (excluding OSS and patched Cloud services). Grafana Labs confirmed no active exploitation in its Cloud environment but urged self-managed users to upgrade to versions 12.3.0, 12.2.1, 12.1.3, or 12.0.6 or disable SCIM. The flaw was internally discovered on November 4, patched within 24 hours, and publicly disclosed on November 19. Prior scanning activity for older Grafana flaws (e.g., path traversal) suggests potential reconnaissance for targeting this new vulnerability.Failure to patch could allow attackers to compromise administrative accounts, leading to unauthorized dashboard access, data manipulation, or lateral movement within enterprise networks. Given Grafana’s role in operational analytics, exploitation could disrupt monitoring, alerting, or compliance reporting, with cascading effects on security posture and incident response.

Grafana Labs
Vulnerability
Severity: 85
Impact: 4
Seen: 5/2025
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: More than 46,000 internet-facing Grafana instances remain unpatched and exposed to a client-side open redirect vulnerability that allows executing a malicious plugin and account takeover. The flaw, tracked as CVE-2025-4123, impacts multiple versions of the open-source platform used for monitoring and visualizing infrastructure and application metrics. Despite security updates released on May 21, a significant number of instances remain vulnerable, posing a risk to user sessions and account credentials.

Ailogo

Grafana Labs Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Grafana Labs

Incidents vs Software Development Industry Average (This Year)

No incidents recorded for Grafana Labs in 2026.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Grafana Labs in 2026.

Incident Types Grafana Labs vs Software Development Industry Avg (This Year)

No incidents recorded for Grafana Labs in 2026.

Incident History — Grafana Labs (X = Date, Y = Severity)

Grafana Labs cyber incidents detection timeline including parent company and subsidiaries

Grafana Labs Company Subsidiaries

SubsidiaryImage

Grafana Labs, the company behind the open observability cloud, is founded on the principles of open source, open standards, open ecosystems, and open culture. Grafana Cloud, our fully managed observability platform, is flexible and built for scale, enabling organizations to see, understand, and act on all their disparate data so they can move at the speed of their ambitions. Today, more than 25 million users and 7,000+ customers – including Anthropic, Bloomberg, NVIDIA, Microsoft, and Salesforce – trust Grafana Labs to ensure reliability of their applications and systems, resolve incidents quickly, and optimize their telemetry to reduce noise and cost. We are a 100% remote company with 1,400+ team members across 40+ countries, and we’re backed by leading investors including Lightspeed Venture Partners, Sequoia Capital, GIC, Coatue, J.P. Morgan, CapitalG, and Lead Edge Capital. Follow Grafana Labs on LinkedIn and Twitter or visit grafana.com.

Loading...
similarCompanies

Grafana Labs Similar Companies

Adobe

Adobe is the global leader in digital media and digital marketing solutions. Our creative, marketing and document solutions empower everyone – from emerging artists to global brands – to bring digital creations to life and deliver immersive, compelling experiences to the right person at the right mo

SAP is the leading enterprise application and business AI company. We stand at the intersection of business and technology, where our innovations are designed to directly address real business challenges and produce real-world impacts. Our solutions are the backbone for the world’s most complex and

bigbasket

Starting our journey in 2011, today, bigbasket - a Tata Enterprise is India’s largest online supermarket with over 13 million customers and a presence in 60+ cities & towns. With our presence spanning the entire spectrum of consumer needs, we operate through a range of business lines - bigbasket, bb

Amazon Fulfillment Technologies & Robotics

On the Fulfillment Technologies & Robotics Team, we build dynamic partnerships between people and intelligent machines. This intricate collaboration helps Amazon fulfill orders with unmatched accuracy. Since we began working with robotics, we've added over a million new jobs worldwide. Working in s

Groupon is an experiences marketplace that brings people more ways to get the most out of their city or wherever they may be. By enabling real-time mobile commerce across local businesses, live events and travel destinations, Groupon helps people find and discover experiences––big and small, new and

PedidosYa

We’re  the delivery market leader in Latin America. Our platform connects over 77.000 restaurants, supermarkets, pharmacies and stores with millions of users. Nowadays we operate in more than 500 cities in Latinamerica. And we are now over 3.400 employees. PedidosYa is available for iOS, Android and

Alibaba Group

🌍Alibaba Group is on a mission to make it easy to do business anywhere! Guided by our passion and imagination, we’re leading the way in AI, cloud computing and e-commerce. We aim to build the future infrastructure of commerce, and we aspire to be a good company that lasts for 102 years.

Join us in our mission to help the world get well, help the world stay well, and help future generations be healthier. We hire smart and motivated people from all academic majors to code, test, and implement healthcare software that hundreds of millions of patients and doctors rely on to improve ca

Red Hat

Red Hat is the world’s leading provider of enterprise open source solutions, using a community-powered approach to deliver high-performing Linux, hybrid cloud, edge, and Kubernetes technologies. We hire creative, passionate people who are ready to contribute their ideas, help solve complex problems

newsone

Grafana Labs CyberSecurity News

January 05, 2026 08:00 AM
Tech unicorn companies list & tracker

Meet the latest billion-dollar startups. Explore trends in unicorn formation over time, by industry and location.

December 09, 2025 08:00 AM
CoreWeave expands tools to boost enterprise AI adoption

Recent Gartner research also emphasizes role of neoclouds in solving the cost, agility, and supply challenges to AI development.

November 26, 2025 08:00 AM
Grafana Cloud at ObservabilityCON 2025: A New Chapter in Observability

At ObservabilityCON 2025, Grafana Labs, a leading observability provider, sketched out a bold vision for the observability landscape...

November 26, 2025 01:22 AM
Wipro and Grafana Labs Partner to Enhance AI-Powered Observability

Wipro and Grafana Labs provide an advanced observability solution with AI-powered monitoring, predictive insights, and real-time cloud performance...

November 25, 2025 08:00 AM
Stop Putting Your Passwords Into Random Websites (Yes, Seriously, You Are The Problem)

Welcome to watchTowr vs the Internet, part 68. That feeling you're experiencing? Dread. You should be used to it by now.

November 21, 2025 08:00 AM
Critical Grafana Vulnerability Let Attackers Escalate Privilege

Grafana Labs disclosed a security flaw affecting Grafana Enterprise that could allow attackers to escalate privileges and impersonate users.

November 21, 2025 08:00 AM
Attackers Escalate Privilege Through Critical Grafana Vulnerability

Grafana Labs has released critical security patches addressing a severe vulnerability in Grafana Enterprise that could allow attackers to...

November 21, 2025 08:00 AM
Critical Grafana Flaw Lets Attackers Escalate Privileges

Grafana Labs, a severe vulnerability in its SCIM provisioning feature that could allow attackers to escalate privileges or impersonate...

November 20, 2025 08:00 AM
Grafana Labs Reveals New Application Observability Solution and Grafana Beyla Project at ObservabilityCON

LONDON, Nov. 15, 2023 — At its annual ObservabilityCON in London, Grafana Labs is announcing a range of new updates to help make it easier...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Grafana Labs CyberSecurity History Information

Official Website of Grafana Labs

The official website of Grafana Labs is https://grafana.com.

Grafana Labs’s AI-Generated Cybersecurity Score

According to Rankiteo, Grafana Labs’s AI-generated cybersecurity score is 761, reflecting their Fair security posture.

How many security badges does Grafana Labs’ have ?

According to Rankiteo, Grafana Labs currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Has Grafana Labs been affected by any supply chain cyber incidents ?

According to Rankiteo, Grafana Labs has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.

Does Grafana Labs have SOC 2 Type 1 certification ?

According to Rankiteo, Grafana Labs is not certified under SOC 2 Type 1.

Does Grafana Labs have SOC 2 Type 2 certification ?

According to Rankiteo, Grafana Labs does not hold a SOC 2 Type 2 certification.

Does Grafana Labs comply with GDPR ?

According to Rankiteo, Grafana Labs is not listed as GDPR compliant.

Does Grafana Labs have PCI DSS certification ?

According to Rankiteo, Grafana Labs does not currently maintain PCI DSS compliance.

Does Grafana Labs comply with HIPAA ?

According to Rankiteo, Grafana Labs is not compliant with HIPAA regulations.

Does Grafana Labs have ISO 27001 certification ?

According to Rankiteo,Grafana Labs is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Grafana Labs

Grafana Labs operates primarily in the Software Development industry.

Number of Employees at Grafana Labs

Grafana Labs employs approximately 1,772 people worldwide.

Subsidiaries Owned by Grafana Labs

Grafana Labs presently has no subsidiaries across any sectors.

Grafana Labs’s LinkedIn Followers

Grafana Labs’s official LinkedIn profile has approximately 258,334 followers.

NAICS Classification of Grafana Labs

Grafana Labs is classified under the NAICS code 5112, which corresponds to Software Publishers.

Grafana Labs’s Presence on Crunchbase

No, Grafana Labs does not have a profile on Crunchbase.

Grafana Labs’s Presence on LinkedIn

Yes, Grafana Labs maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/grafana-labs.

Cybersecurity Incidents Involving Grafana Labs

As of January 21, 2026, Rankiteo reports that Grafana Labs has experienced 2 cybersecurity incidents.

Number of Peer and Competitor Companies

Grafana Labs has an estimated 28,138 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Grafana Labs ?

Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability.

How does Grafana Labs detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with upgrade to patched versions: 10.4.18+security-01, 11.2.9+security-01, 11.3.6+security-01, 11.4.4+security-01, 11.5.4+security-01, 11.6.1+security-01, and 12.0.0+security-01, and and containment measures with patch deployment (grafana enterprise 12.3.0, 12.2.1, 12.1.3, 12.0.6), containment measures with disabling scim provisioning, and remediation measures with software updates, remediation measures with configuration changes (disabling scim), and communication strategy with public security bulletin, communication strategy with customer advisories..

Incident Details

Can you provide details on each incident ?

Incident : Vulnerability Exploitation

Title: Grafana Ghost Vulnerability (CVE-2025-4123)

Description: More than 46,000 internet-facing Grafana instances remain unpatched and exposed to a client-side open redirect vulnerability that allows executing a malicious plugin and account takeover.

Date Publicly Disclosed: 2023-05-21

Type: Vulnerability Exploitation

Attack Vector: Client-side open redirect

Vulnerability Exploited: CVE-2025-4123

Motivation: Account takeover, execution of malicious plugins

Incident : Vulnerability

Title: Grafana Enterprise Privilege Escalation Vulnerability (CVE-2025-41115)

Description: Grafana Labs has disclosed a maximum severity vulnerability (CVE-2025-41115) in its Enterprise product that allows new users to be treated as administrators or enables privilege escalation when SCIM (System for Cross-domain Identity Management) provisioning is enabled. The flaw arises when both the 'enableSCIM' feature flag and 'user_sync_enabled' options are set to true, permitting a malicious or compromised SCIM client to provision a user with a numeric 'externalId' that maps to an internal account, including administrators. This could lead to impersonation or unauthorized privilege escalation. The issue was discovered during internal auditing on November 4, 2024, and patched within 24 hours. Public disclosure followed on November 19, 2024. Grafana Cloud services (including Amazon Managed Grafana and Azure Managed Grafana) were patched prior to disclosure, while self-managed installations require updates to versions 12.3.0, 12.2.1, 12.1.3, or 12.0.6. Grafana OSS users are unaffected.

Date Detected: 2024-11-04

Date Publicly Disclosed: 2024-11-19

Type: Vulnerability

Attack Vector: NetworkSCIM Provisioning Misconfiguration

Vulnerability Exploited: CVE-2025-41115 (Improper Mapping of SCIM 'externalId' to Internal 'user.uid')

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Vulnerability.

Impact of the Incidents

What was the impact of each incident ?

Incident : Vulnerability Exploitation GRA600061525

Systems Affected: 46,506 Grafana instances

Incident : Vulnerability GRA2792027112125

Systems Affected: Grafana Enterprise (Self-Managed)

Operational Impact: Potential Unauthorized Administrative AccessImpersonation Risk

Brand Reputation Impact: Potential Erosion of Trust Due to Privilege Escalation Risk

Which entities were affected by each incident ?

Incident : Vulnerability Exploitation GRA600061525

Entity Name: Grafana Labs

Entity Type: Software Company

Industry: Technology

Incident : Vulnerability GRA2792027112125

Entity Name: Grafana Labs

Entity Type: Organization

Industry: Software, Data Visualization, Monitoring

Location: Global

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Vulnerability Exploitation GRA600061525

Remediation Measures: Upgrade to patched versions: 10.4.18+security-01, 11.2.9+security-01, 11.3.6+security-01, 11.4.4+security-01, 11.5.4+security-01, 11.6.1+security-01, and 12.0.0+security-01

Incident : Vulnerability GRA2792027112125

Incident Response Plan Activated: True

Containment Measures: Patch Deployment (Grafana Enterprise 12.3.0, 12.2.1, 12.1.3, 12.0.6)Disabling SCIM Provisioning

Remediation Measures: Software UpdatesConfiguration Changes (Disabling SCIM)

Communication Strategy: Public Security BulletinCustomer Advisories

Data Breach Information

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Upgrade to patched versions: 10.4.18+security-01, 11.2.9+security-01, 11.3.6+security-01, 11.4.4+security-01, 11.5.4+security-01, 11.6.1+security-01, and 12.0.0+security-01, Software Updates, Configuration Changes (Disabling SCIM), .

How does the company handle incidents involving personally identifiable information (PII) ?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by patch deployment (grafana enterprise 12.3.0, 12.2.1, 12.1.3, 12.0.6), disabling scim provisioning and .

Lessons Learned and Recommendations

What lessons were learned from each incident ?

Incident : Vulnerability Exploitation GRA600061525

Lessons Learned: Regularly update and patch software to mitigate vulnerabilities.

Incident : Vulnerability GRA2792027112125

Lessons Learned: Importance of Secure Default Configurations for Preview Features, Rapid Patch Deployment for Critical Vulnerabilities, Proactive Monitoring for Exploitation Attempts (e.g., GreyNoise Scanning Activity)

What recommendations were made to prevent future incidents ?

Incident : Vulnerability Exploitation GRA600061525

Recommendations: Upgrade to the latest patched versions of Grafana.

Incident : Vulnerability GRA2792027112125

Recommendations: Upgrade Grafana Enterprise to patched versions (12.3.0, 12.2.1, 12.1.3, or 12.0.6) immediately., Disable SCIM provisioning if not required., Monitor for unusual SCIM-related activity or privilege escalation attempts., Review and audit user provisioning workflows, especially for identity management integrations.Upgrade Grafana Enterprise to patched versions (12.3.0, 12.2.1, 12.1.3, or 12.0.6) immediately., Disable SCIM provisioning if not required., Monitor for unusual SCIM-related activity or privilege escalation attempts., Review and audit user provisioning workflows, especially for identity management integrations.Upgrade Grafana Enterprise to patched versions (12.3.0, 12.2.1, 12.1.3, or 12.0.6) immediately., Disable SCIM provisioning if not required., Monitor for unusual SCIM-related activity or privilege escalation attempts., Review and audit user provisioning workflows, especially for identity management integrations.Upgrade Grafana Enterprise to patched versions (12.3.0, 12.2.1, 12.1.3, or 12.0.6) immediately., Disable SCIM provisioning if not required., Monitor for unusual SCIM-related activity or privilege escalation attempts., Review and audit user provisioning workflows, especially for identity management integrations.

What are the key lessons learned from past incidents ?

Key Lessons Learned: The key lessons learned from past incidents are Regularly update and patch software to mitigate vulnerabilities.Importance of Secure Default Configurations for Preview Features,Rapid Patch Deployment for Critical Vulnerabilities,Proactive Monitoring for Exploitation Attempts (e.g., GreyNoise Scanning Activity).

What recommendations has the company implemented to improve cybersecurity ?

Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Upgrade to the latest patched versions of Grafana..

References

Where can I find more information about each incident ?

Incident : Vulnerability Exploitation GRA600061525

Source: BleepingComputer

Incident : Vulnerability GRA2792027112125

Source: Grafana Labs Security Bulletin

Date Accessed: 2024-11-19

Incident : Vulnerability GRA2792027112125

Source: GreyNoise Report on Grafana Scanning Activity

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: BleepingComputer, and Source: Grafana Labs Security BulletinDate Accessed: 2024-11-19, and Source: GreyNoise Report on Grafana Scanning Activity.

Investigation Status

What is the current status of the investigation for each incident ?

Incident : Vulnerability GRA2792027112125

Investigation Status: Resolved (No Evidence of Exploitation in Grafana Cloud)

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public Security Bulletin and Customer Advisories.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : Vulnerability GRA2792027112125

Stakeholder Advisories: Customers Advised To Apply Patches Or Disable Scim.

Customer Advisories: Public security bulletin issued with mitigation steps

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Customers Advised To Apply Patches Or Disable Scim, Public Security Bulletin Issued With Mitigation Steps and .

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : Vulnerability Exploitation GRA600061525

Root Causes: Unpatched software, lack of awareness about the vulnerability

Corrective Actions: Apply security patches, increase user awareness about updates

Incident : Vulnerability GRA2792027112125

Root Causes: Improper Mapping Of Scim 'Externalid' To Internal 'User.Uid' In Grafana Enterprise, Insufficient Validation Of Numeric 'Externalid' Values During User Provisioning, Preview Feature (Scim) Enabled Without Robust Safeguards,

Corrective Actions: Released Patched Versions (12.3.0, 12.2.1, 12.1.3, 12.0.6) With Fixed Scim Provisioning Logic, Enhanced Input Validation For Scim Attributes, Proactive Communication To Customers About Risk And Mitigations,

What corrective actions has the company taken based on post-incident analysis ?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Apply security patches, increase user awareness about updates, Released Patched Versions (12.3.0, 12.2.1, 12.1.3, 12.0.6) With Fixed Scim Provisioning Logic, Enhanced Input Validation For Scim Attributes, Proactive Communication To Customers About Risk And Mitigations, .

Additional Questions

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2024-11-04.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-11-19.

Impact of the Incidents

What was the most significant system affected in an incident ?

Most Significant System Affected: The most significant system affected in an incident was Grafana Enterprise (Self-Managed).

Response to the Incidents

What containment measures were taken in the most recent incident ?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Patch Deployment (Grafana Enterprise 12.3.0, 12.2.1, 12.1.3 and 12.0.6)Disabling SCIM Provisioning.

Lessons Learned and Recommendations

What was the most significant lesson learned from past incidents ?

Most Significant Lesson Learned: The most significant lesson learned from past incidents was Proactive Monitoring for Exploitation Attempts (e.g., GreyNoise Scanning Activity).

What was the most significant recommendation implemented to improve cybersecurity ?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Monitor for unusual SCIM-related activity or privilege escalation attempts., Upgrade Grafana Enterprise to patched versions (12.3.0, 12.2.1, 12.1.3, or 12.0.6) immediately., Upgrade to the latest patched versions of Grafana., Review and audit user provisioning workflows, especially for identity management integrations. and Disable SCIM provisioning if not required..

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident are BleepingComputer, Grafana Labs Security Bulletin and GreyNoise Report on Grafana Scanning Activity.

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Resolved (No Evidence of Exploitation in Grafana Cloud).

Stakeholder and Customer Advisories

What was the most recent stakeholder advisory issued ?

Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Customers advised to apply patches or disable SCIM, .

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued was an Public security bulletin issued with mitigation steps.

Post-Incident Analysis

What was the most significant root cause identified in post-incident analysis ?

Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Unpatched software, lack of awareness about the vulnerability, Improper mapping of SCIM 'externalId' to internal 'user.uid' in Grafana EnterpriseInsufficient validation of numeric 'externalId' values during user provisioningPreview feature (SCIM) enabled without robust safeguards.

What was the most significant corrective action taken based on post-incident analysis ?

Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Apply security patches, increase user awareness about updates, Released patched versions (12.3.0, 12.2.1, 12.1.3, 12.0.6) with fixed SCIM provisioning logicEnhanced input validation for SCIM attributesProactive communication to customers about risk and mitigations.

cve

Latest Global CVEs (Not Company-Specific)

Description

SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g.,  execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.

Risk Information
cvss4
Base: 7.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).

Risk Information
cvss3
Base: 8.1
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=grafana-labs' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge