ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

LG Energy Solutions leads the future eco-friendly energy industry by developing distinguished materials and next-generation batteries. As the only chemical-based battery company in the world, we are leading the global lithium-ion battery market based on distinguished materials technology. We have become a global powerhouse in the EV and energy storage system (ESS) battery sector. And based on our unparalleled technologies, we are actively developing new products and procuring global battery production capacities to enhance our dominance in the next-generation energy market.

LG Energy Solution A.I CyberSecurity Scoring

LES

Company Details

Linkedin ID:

lgenergysolution

Employees number:

6,550

Number of followers:

76,986

NAICS:

325

Industry Type:

Chemical Manufacturing

Homepage:

lgensol.com

IP Addresses:

0

Company ID:

LG _2166372

Scan Status:

In-progress

AI scoreLES Risk Score (AI oriented)

Between 650 and 699

https://images.rankiteo.com/companyimages/lgenergysolution.jpeg
LES Chemical Manufacturing
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreLES Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/lgenergysolution.jpeg
LES Chemical Manufacturing
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

LES Company CyberSecurity News & History

Past Incidents
2
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
LG Energy SolutionRansomware85311/2025
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: LG Energy Solution, a South Korean battery manufacturer specializing in lithium-ion batteries for electric vehicles (EVs) and energy storage systems, suffered a ransomware attack at one of its overseas facilities. The Akira ransomware group claimed responsibility, alleging the theft of **1.7TB of data**, including **employee records** (visas, US/Korean passports, medical documents, Korean ID cards, addresses, phones, emails) and **corporate documents** (confidential projects, NDAs, financials, client/partner information, contracts). The impacted facility was restored to normal operations, but the stolen data—if verified—poses risks of **phishing attacks**, **black-market sales**, or **further exploitation**. The headquarters and other facilities remained unaffected, though investigations are ongoing. The breach’s scale and the sensitivity of the leaked employee and corporate data heighten concerns over financial fraud, reputational damage, and operational disruptions.

LG Energy SolutionRansomware10056/2023
Rankiteo Explanation :
Attack threatening the organization's existence

Description: LG Energy Solution, a South Korea-based subsidiary of LG and one of the world’s largest battery manufacturers (earning $17.5 billion in 2024), confirmed a ransomware attack targeting a specific overseas facility. The Akira ransomware gang claimed responsibility, asserting they stole **1.7 terabytes of data**, including **corporate documents and employee databases**. While the headquarters and other facilities remained unaffected, the incident disrupted operations at the targeted site, requiring recovery measures before normal functionality resumed. The FBI had previously flagged Akira for its aggressive tactics, noting over **$244 million in ransom proceeds** and disruptions across critical sectors like manufacturing, hospitals, and schools. The attack underscores the growing threat to battery suppliers, following similar incidents like Varta AG’s weeks-long outage in 2023 and a $60 million theft from another key material supplier in 2024. LG is conducting investigations but has not disclosed further details about the breach’s scope or potential ransom demands.

LG Energy Solution
Ransomware
Severity: 85
Impact: 3
Seen: 11/2025
Blog:
Rankiteo Explanation
Attack with significant impact with internal employee data leaks

Description: LG Energy Solution, a South Korean battery manufacturer specializing in lithium-ion batteries for electric vehicles (EVs) and energy storage systems, suffered a ransomware attack at one of its overseas facilities. The Akira ransomware group claimed responsibility, alleging the theft of **1.7TB of data**, including **employee records** (visas, US/Korean passports, medical documents, Korean ID cards, addresses, phones, emails) and **corporate documents** (confidential projects, NDAs, financials, client/partner information, contracts). The impacted facility was restored to normal operations, but the stolen data—if verified—poses risks of **phishing attacks**, **black-market sales**, or **further exploitation**. The headquarters and other facilities remained unaffected, though investigations are ongoing. The breach’s scale and the sensitivity of the leaked employee and corporate data heighten concerns over financial fraud, reputational damage, and operational disruptions.

LG Energy Solution
Ransomware
Severity: 100
Impact: 5
Seen: 6/2023
Blog:
Rankiteo Explanation
Attack threatening the organization's existence

Description: LG Energy Solution, a South Korea-based subsidiary of LG and one of the world’s largest battery manufacturers (earning $17.5 billion in 2024), confirmed a ransomware attack targeting a specific overseas facility. The Akira ransomware gang claimed responsibility, asserting they stole **1.7 terabytes of data**, including **corporate documents and employee databases**. While the headquarters and other facilities remained unaffected, the incident disrupted operations at the targeted site, requiring recovery measures before normal functionality resumed. The FBI had previously flagged Akira for its aggressive tactics, noting over **$244 million in ransom proceeds** and disruptions across critical sectors like manufacturing, hospitals, and schools. The attack underscores the growing threat to battery suppliers, following similar incidents like Varta AG’s weeks-long outage in 2023 and a $60 million theft from another key material supplier in 2024. LG is conducting investigations but has not disclosed further details about the breach’s scope or potential ransom demands.

Ailogo

LES Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for LES

Incidents vs Chemical Manufacturing Industry Average (This Year)

LG Energy Solution has 0.0% fewer incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs All-Companies Average (This Year)

LG Energy Solution has 56.25% more incidents than the average of all companies with at least one recorded incident.

Incident Types LES vs Chemical Manufacturing Industry Avg (This Year)

LG Energy Solution reported 1 incidents this year: 0 cyber attacks, 1 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.

Incident History — LES (X = Date, Y = Severity)

LES cyber incidents detection timeline including parent company and subsidiaries

LES Company Subsidiaries

SubsidiaryImage

LG Energy Solutions leads the future eco-friendly energy industry by developing distinguished materials and next-generation batteries. As the only chemical-based battery company in the world, we are leading the global lithium-ion battery market based on distinguished materials technology. We have become a global powerhouse in the EV and energy storage system (ESS) battery sector. And based on our unparalleled technologies, we are actively developing new products and procuring global battery production capacities to enhance our dominance in the next-generation energy market.

Loading...
similarCompanies

LES Similar Companies

Airgas

Airgas, an Air Liquide company, is a leading U.S. supplier of industrial, medical and specialty gases, as well as hardgoods and related products; one of the largest U.S. suppliers of safety products; and a leading U.S. supplier of ammonia products and process chemicals. Dedicated to improving the

Asahi Kasei

The Asahi Kasei Group contributes to life and living for people around the world. Since its foundation in 1922 with ammonia and cellulose fiber business, Asahi Kasei has consistently grown through the proactive transformation of its business portfolio to meet the evolving needs of every age. With mo

Givaudan

Givaudan is a global leader in Fragrance & Beauty and Taste & Wellbeing. We celebrate the beauty of human experience by creating for happier, healthier lives with love for nature. Together with our customers we deliver food experiences, craft inspired fragrances, and develop beauty and wellbeing sol

At BASF, we create chemistry for a sustainable future. Our ambition: We want to be the preferred chemical company to enable our customers’ green transformation. We combine economic success with environmental protection and social responsibility. Around 112,000 employees in the BASF Group contribute

UralChem

UralChem is a leading producer of nitrogen and phosphate fertilizers in Russia/CIS with production capacities of over 2.7 million tonnes of ammonium nitrate, 2.2 million tonnes of ammonia, 0.8 million tonnes of MAP and DAP, 0.8 million tonnes of complex fertilizers and 0.5 million tonnes of urea. Ur

Eastman

Founded in 1920, Eastman is a global specialty materials company that produces a broad range of products found in items people use every day. With the purpose of enhancing the quality of life in a material way, Eastman works with customers to deliver innovative products and solutions while maintaini

INEOS

We are a global manufacturer of raw materials and a producer of energy used in everyday life. From medicines to mobile phones, agriculture to automotive, our products enhance standards of living for everyone around the world. We understand the challenge the world is facing, and we are working hard

Evonik

Evonik is one of the world’s leading specialty chemicals companies. While we don’t produce electric cars, aircraft, medications or 3D printers, Evonik is part and parcel of these and many other end products. That’s because we contribute the small things that make a big difference. We make electric c

Linde

Linde is a leading global industrial gases and engineering company with 2023 sales of $33 billion. We live our mission of making our world more productive every day by providing high-quality solutions, technologies and services which are making our customers more successful and helping to sustain, d

newsone

LES CyberSecurity News

November 20, 2025 12:39 PM
LG Energy Solution Hit by Akira Ransomware, Data Breach Confirmed

LG Energy Solution, a leading South Korean battery manufacturer with global operations, confirmed a significant ransomware incident...

November 20, 2025 12:03 PM
News - LG Energy Solution targeted in ransomware attack linked to Akira gang

LG Energy Solution, one of the world's largest battery manufacturers, confirmed it had been hit by a ransomware attack after a cybercriminal...

November 19, 2025 01:37 PM
MI5 Warns of Chinese Spies Posing as Recruiters to Access Sensitive Information from UK Officials

UK intelligence agency MI5 has issued a warning about Chinese spies using fake headhunter profiles to recruit individuals with government...

November 18, 2025 08:36 PM
LG battery subsidiary says ransomware attack targeted overseas facility

A "specific overseas facility" fell prey to a ransomware attack but is now operating normally, according to LG Energy Solution — the South...

November 18, 2025 03:07 PM
LG Energy Solution Data Breach May Have Exposed 1.7TB of Employee Records and SQL Data

The Akira hacking group claims to have breached LG Energy Solution, alleging the theft of 1.7 TB of sensitive data, including employee and...

November 17, 2025 05:40 PM
2025 Tech Horizon: AI Agents, Quantum Leaps, and Decentralized Futures

In the rapidly evolving landscape of technology, 2025 is poised to be a pivotal year where artificial intelligence, quantum computing,...

November 11, 2025 08:00 AM
LG Energy Solution to Enter Aerospace Battery Sector in Partnership with South8 Technologies

LG Energy Solution today announced a strategic partnership with South 8 Technologies to jointly develop space-rated lithium-ion batteries...

November 03, 2025 08:00 AM
Cybersecurity Market Size, Share, Analysis | Global Report 2032

The global cybersecurity market size is projected to grow from $218.98 billion in 2025 to $562.77 billion by 2032, at a CAGR of 14.4% during...

October 30, 2025 07:00 AM
Cybersecurity News: LG Uplus confirms breach, Conduent attack impacts 10M+, hackers exploit tools against Ukraine

LG Uplus, one of South Korea's largest telecoms, reported a suspected data breach to the country's cybersecurity agency KISA,...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

LES CyberSecurity History Information

Official Website of LG Energy Solution

The official website of LG Energy Solution is https://www.lgensol.com/en/index.

LG Energy Solution’s AI-Generated Cybersecurity Score

According to Rankiteo, LG Energy Solution’s AI-generated cybersecurity score is 690, reflecting their Weak security posture.

How many security badges does LG Energy Solution’ have ?

According to Rankiteo, LG Energy Solution currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does LG Energy Solution have SOC 2 Type 1 certification ?

According to Rankiteo, LG Energy Solution is not certified under SOC 2 Type 1.

Does LG Energy Solution have SOC 2 Type 2 certification ?

According to Rankiteo, LG Energy Solution does not hold a SOC 2 Type 2 certification.

Does LG Energy Solution comply with GDPR ?

According to Rankiteo, LG Energy Solution is not listed as GDPR compliant.

Does LG Energy Solution have PCI DSS certification ?

According to Rankiteo, LG Energy Solution does not currently maintain PCI DSS compliance.

Does LG Energy Solution comply with HIPAA ?

According to Rankiteo, LG Energy Solution is not compliant with HIPAA regulations.

Does LG Energy Solution have ISO 27001 certification ?

According to Rankiteo,LG Energy Solution is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of LG Energy Solution

LG Energy Solution operates primarily in the Chemical Manufacturing industry.

Number of Employees at LG Energy Solution

LG Energy Solution employs approximately 6,550 people worldwide.

Subsidiaries Owned by LG Energy Solution

LG Energy Solution presently has no subsidiaries across any sectors.

LG Energy Solution’s LinkedIn Followers

LG Energy Solution’s official LinkedIn profile has approximately 76,986 followers.

NAICS Classification of LG Energy Solution

LG Energy Solution is classified under the NAICS code 325, which corresponds to Chemical Manufacturing.

LG Energy Solution’s Presence on Crunchbase

Yes, LG Energy Solution has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/lg-energy-solution.

LG Energy Solution’s Presence on LinkedIn

Yes, LG Energy Solution maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/lgenergysolution.

Cybersecurity Incidents Involving LG Energy Solution

As of November 27, 2025, Rankiteo reports that LG Energy Solution has experienced 2 cybersecurity incidents.

Number of Peer and Competitor Companies

LG Energy Solution has an estimated 4,119 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at LG Energy Solution ?

Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.

How does LG Energy Solution detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with isolation of affected facility, and remediation measures with security measures implemented, remediation measures with investigation conducted, and recovery measures with facility restored to normal operations, and communication strategy with public statement confirming attack, communication strategy with limited details shared, and and containment measures with isolation of affected facility, containment measures with mitigation of attack spread, and remediation measures with recovery of impacted systems, remediation measures with security operations enhancement, and recovery measures with restoration of facility operations to normal, and communication strategy with public statement confirming attack and mitigation, communication strategy with no further details disclosed during investigation, and enhanced monitoring with precautionary security operations ongoing..

Incident Details

Can you provide details on each incident ?

Incident : ransomware

Title: LG Energy Solution Ransomware Attack by Akira Gang

Description: LG Energy Solution, one of the world’s largest battery makers, confirmed a ransomware attack by the Akira gang, which claimed to have stolen 1.7 TB of data, including corporate documents and employee databases. The attack targeted a specific overseas facility, which has since been recovered and is operating normally. The company is conducting security investigations as a precautionary measure.

Type: ransomware

Threat Actor: Akira ransomware gang

Motivation: financial gaindata theft

Incident : ransomware

Title: Ransomware Attack on LG Energy Solution Overseas Facility

Description: LG Energy Solution, a South Korean battery manufacturer and subsidiary of LG, confirmed a ransomware attack targeting one of its overseas facilities. The attack was mitigated, and the facility is now operational. The Akira ransomware group claimed responsibility, alleging the theft of ~1.7TB of data, including employee records, corporate documents, and SQL databases. The stolen data could be used for phishing or sold on the dark web for significant profit. LG is investigating the incident but has not confirmed the extent of the breach.

Type: ransomware

Threat Actor: Akira

Motivation: financial gaindata theft

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Impact of the Incidents

What was the impact of each incident ?

Incident : ransomware LGE5202152111925

Data Compromised: Corporate documents, Employee information databases

Systems Affected: specific overseas facility

Operational Impact: temporary disruption (facility recovered and operating normally)

Brand Reputation Impact: potential reputational damage due to data breach and ransomware association

Identity Theft Risk: high (employee information compromised)

Incident : ransomware LGE4092240111925

Data Compromised: Employee personal information (visas, us/korean passports, medical documents, korean id cards, addresses, phones, emails), Confidential projects, Ndas, Confidentiality agreements, Detailed financials, Client/partner information, Contracts, Sql databases

Systems Affected: one specific overseas facility

Operational Impact: Facility temporarily disrupted; now restored to normal operations

Brand Reputation Impact: Potential reputational damage due to data exposure and ransomware association

Identity Theft Risk: High (due to exposure of PII like passports, ID cards, medical records)

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Corporate Documents, Employee Information, , Employee Pii, Corporate Documents, Financial Records, Contracts, Ndas, Sql Databases and .

Which entities were affected by each incident ?

Incident : ransomware LGE5202152111925

Entity Name: LG Energy Solution

Entity Type: subsidiary (of LG Corp)

Industry: battery manufacturing

Location: South Korea (HQ)overseas facility (unspecified)facilities in North America (8) and other continents

Size: large (global, $17.5B revenue in 2024)

Incident : ransomware LGE4092240111925

Entity Name: LG Energy Solution

Entity Type: Subsidiary (of LG Corporation)

Industry: automotive (EV batteries), energy storage systems, consumer electronics

Location: South Korea

Size: Large (global operations, $17B+ revenue in 2024)

Response to the Incidents

What measures were taken in response to each incident ?

Incident : ransomware LGE5202152111925

Incident Response Plan Activated: True

Containment Measures: isolation of affected facility

Remediation Measures: security measures implementedinvestigation conducted

Recovery Measures: facility restored to normal operations

Communication Strategy: public statement confirming attacklimited details shared

Incident : ransomware LGE4092240111925

Incident Response Plan Activated: True

Containment Measures: Isolation of affected facilityMitigation of attack spread

Remediation Measures: Recovery of impacted systemsSecurity operations enhancement

Recovery Measures: Restoration of facility operations to normal

Communication Strategy: Public statement confirming attack and mitigationNo further details disclosed during investigation

Enhanced Monitoring: Precautionary security operations ongoing

Data Breach Information

What type of data was compromised in each breach ?

Incident : ransomware LGE5202152111925

Type of Data Compromised: Corporate documents, Employee information

Sensitivity of Data: high (employee PII and corporate data)

Incident : ransomware LGE4092240111925

Type of Data Compromised: Employee pii, Corporate documents, Financial records, Contracts, Ndas, Sql databases

Sensitivity of Data: High (includes passports, medical records, financials, confidential agreements)

Data Exfiltration: Claimed: ~1.7TB (1.67TB corporate documents + 46GB SQL databases)

File Types Exposed: documentsdatabases (SQL)PDFs (likely for contracts/NDAs)image files (scans of passports/ID cards)

Personally Identifiable Information: full namespassport numbersKorean ID numbersaddressesphone numbersemail addressesmedical documentsvisa information

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: security measures implemented, investigation conducted, , Recovery of impacted systems, Security operations enhancement, .

How does the company handle incidents involving personally identifiable information (PII) ?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by isolation of affected facility, , isolation of affected facility, mitigation of attack spread and .

Ransomware Information

Was ransomware involved in any of the incidents ?

Incident : ransomware LGE5202152111925

Ransomware Strain: Akira

Data Exfiltration: True

Incident : ransomware LGE4092240111925

Ransomware Strain: Akira

Data Exfiltration: Claimed: ~1.7TB

How does the company recover data encrypted by ransomware ?

Data Recovery from Ransomware: The company recovers data encrypted by ransomware through facility restored to normal operations, , Restoration of facility operations to normal, .

References

Where can I find more information about each incident ?

Incident : ransomware LGE5202152111925

Source: FBI Advisory on Akira Ransomware

Date Accessed: 2023-11-13

Incident : ransomware LGE5202152111925

Source: LG Energy Solution Spokesperson Statement

Incident : ransomware LGE5202152111925

Source: Akira Ransomware Leak Site

Incident : ransomware LGE4092240111925

Source: The Record

Incident : ransomware LGE4092240111925

Source: TechRadar

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: FBI Advisory on Akira RansomwareDate Accessed: 2023-11-13, and Source: LG Energy Solution Spokesperson Statement, and Source: Akira Ransomware Leak Site, and Source: The Record, and Source: TechRadar.

Investigation Status

What is the current status of the investigation for each incident ?

Incident : ransomware LGE5202152111925

Investigation Status: ongoing (precautionary security operations and investigations)

Incident : ransomware LGE4092240111925

Investigation Status: Ongoing (LG Energy Solution conducting security operations and investigations)

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public Statement Confirming Attack, Limited Details Shared, Public Statement Confirming Attack And Mitigation and No Further Details Disclosed During Investigation.

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : ransomware LGE5202152111925

High Value Targets: Employee Databases, Corporate Documents,

Data Sold on Dark Web: Employee Databases, Corporate Documents,

Incident : ransomware LGE4092240111925

High Value Targets: Employee Databases, Financial Records, Confidential Agreements,

Data Sold on Dark Web: Employee Databases, Financial Records, Confidential Agreements,

Post-Incident Analysis

What is the company's process for conducting post-incident analysis ?

Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Precautionary security operations ongoing.

Additional Questions

General Information

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident were an Akira ransomware gang and Akira.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were corporate documents, employee information databases, , employee personal information (visas, US/Korean passports, medical documents, Korean ID cards, addresses, phones, emails), confidential projects, NDAs, confidentiality agreements, detailed financials, client/partner information, contracts, SQL databases and .

What was the most significant system affected in an incident ?

Most Significant System Affected: The most significant system affected in an incident was specific overseas facility and one specific overseas facility.

Response to the Incidents

What containment measures were taken in the most recent incident ?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were isolation of affected facility and Isolation of affected facilityMitigation of attack spread.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were client/partner information, employee personal information (visas, US/Korean passports, medical documents, Korean ID cards, addresses, phones, emails), NDAs, detailed financials, contracts, SQL databases, corporate documents, confidentiality agreements, confidential projects and employee information databases.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident are The Record, Akira Ransomware Leak Site, FBI Advisory on Akira Ransomware, LG Energy Solution Spokesperson Statement and TechRadar.

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is ongoing (precautionary security operations and investigations).

cve

Latest Global CVEs (Not Company-Specific)

Description

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.

Risk Information
cvss4
Base: 7.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 6.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=lgenergysolution' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge