Comparison Overview

Kohler Co.

VS

Electrolux Group

Kohler Co.

444 Highland Drive, None, Kohler, Wisconsin, US, 53044
Last Update: 2025-07-27 (UTC)

We’re a community of creators. Status quo busters. Difference makers. For the past 150 years, we’ve built our business on a singular mission—helping people live gracious, healthy, and sustainable lives. Thanks to the passion, craftsmanship, and ingenuity of our associates around the world, our business has expanded across the globe with a diverse portfolio of brands. Today, we’re one of America’s oldest and largest privately held companies. We manufacture smart kitchen & bath products and host world-class hospitality experiences. At 30,000 strong, we’re the driving force behind so much meaningful progress as we strive to #BecomeMoreAtKohler—individually and together. We’re unafraid of bold action and inspired to design better tomorrows. Here’s to the next 150 years. Learn more about Kohler's hiring practices to help you avoid recruitment fraud: https://www.kohlercompany.com/careers/how-we-hire/recruitment-fraud/

NAICS: 30
NAICS Definition: Manufacturing
Employees: 14,194
Subsidiaries: 2
12-month incidents
0
Known data breaches
0
Attack type number
0

Electrolux Group

Electrolux - Stockholm, Stockholm, undefined, SE-10545, SE
Last Update: 2024-11-06 (UTC)

Excellent

Between 900 and 1000

Electrolux Group is a leading global appliance company that has shaped living for the better for more than 100 years. We reinvent taste, care and wellbeing experiences for millions of people, always striving to be at the forefront of sustainability in society through our solutions and operations. Under our group of leading appliance brands, including Electrolux, AEG and Frigidaire, we sell household products in around 120 markets every year. In 2023 Electrolux Group had sales of SEK 134 billion and employed 45,000 people around the world. For more information, go to www.electroluxgroup.com. Electrolux Group moderation policy: We welcome your comments, viewpoints and thoughtful discussion on this page. At Electrolux Group, we are guided by our values of respect, dignity and common courtesy and ask that any comment you post on our page contributes to the LinkedIn community in a positive manner as set out in LinkedIn’s Community Guidelines and User Agreement. Accordingly, we will report any individual or organization who shares abusive, hateful or harmful comments on our page relating to a person or group of people and/or otherwise uses foul or otherwise offensive language and we retain the right to remove such comment.

NAICS: 30
NAICS Definition: Manufacturing
Employees: 28,850
Subsidiaries: 1
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/kohler.jpeg
Kohler Co.
ISO 27001
Not verified
SOC 2
Not verified
GDPR
No public badge
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/electroluxgroup.jpeg
Electrolux Group
ISO 27001
Not verified
SOC 2
Not verified
GDPR
No public badge
PCI DSS
No public badge
Compliance Summary
Kohler Co.
100%
Compliance Rate
0/4 Standards Verified
Electrolux Group
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Manufacturing Industry Average (This Year)

No incidents recorded for Kohler Co. in 2025.

Incidents vs Manufacturing Industry Average (This Year)

No incidents recorded for Electrolux Group in 2025.

Incident History — Kohler Co. (X = Date, Y = Severity)

Kohler Co. cyber incidents detection timeline including parent company and subsidiaries

Incident History — Electrolux Group (X = Date, Y = Severity)

Electrolux Group cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/kohler.jpeg
Kohler Co.
Incidents

No Incident

https://images.rankiteo.com/companyimages/electroluxgroup.jpeg
Electrolux Group
Incidents

No Incident

FAQ

Electrolux Group company company demonstrates a stronger AI risk posture compared to Kohler Co. company company, reflecting its advanced AI governance and monitoring frameworks.

Historically, Electrolux Group company has disclosed a higher number of cyber incidents compared to Kohler Co. company.

In the current year, Electrolux Group company and Kohler Co. company have not reported any cyber incidents.

Neither Electrolux Group company nor Kohler Co. company has reported experiencing a ransomware attack publicly.

Neither Electrolux Group company nor Kohler Co. company has reported experiencing a data breach publicly.

Neither Electrolux Group company nor Kohler Co. company has reported experiencing targeted cyberattacks publicly.

Neither Kohler Co. company nor Electrolux Group company has reported experiencing or disclosing vulnerabilities publicly.

Kohler Co. company has more subsidiaries worldwide compared to Electrolux Group company.

Electrolux Group company employs more people globally than Kohler Co. company, reflecting its scale as a Manufacturing.

Latest Global CVEs (Not Company-Specific)

Description

A vulnerability has been found in code-projects Project Monitoring System 1.0. Affected is an unknown function of the file /onlineJobSearchEngine/postjob.php. Such manipulation of the argument txtapplyto leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:N/I:P/A:N
cvss3
Base: 3.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.1
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A flaw has been found in Tenda AC18 15.03.05.19. This impacts an unknown function of the file /goform/saveAutoQos. This manipulation of the argument enable causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been published and may be used.

Risk Information
cvss2
Base: 9.0
Severity: LOW
AV:N/AC:L/Au:S/C:C/I:C/A:C
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 7.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was detected in Tenda AC18 15.03.05.19. This affects an unknown function of the file /goform/WizardHandle. The manipulation of the argument WANT/mtuvalue results in stack-based buffer overflow. The attack can be launched remotely. The exploit is now public and may be used.

Risk Information
cvss2
Base: 9.0
Severity: LOW
AV:N/AC:L/Au:S/C:C/I:C/A:C
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 7.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security vulnerability has been detected in Tenda AC18 15.03.05.19. The impacted element is an unknown function of the file /goform/AdvSetLanip. The manipulation of the argument lanIp leads to command injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used.

Risk Information
cvss2
Base: 6.5
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 6.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in Tenda AC8 16.03.34.06. The affected element is the function formSetServerConfig of the file /goform/SetServerConfig. Executing manipulation can lead to buffer overflow. It is possible to launch the attack remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 9.0
Severity: LOW
AV:N/AC:L/Au:S/C:C/I:C/A:C
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 7.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X