Comparison Overview

Motherson Group

VS

Nissan Motor Corporation

Motherson Group

Plot number 1, Noida, 201301, IN
Last Update: 2025-12-09
Between 750 and 799

Founded in 1975, Motherson is one of the world’s leading auto component makers, supplying OEMs globally from over 400 facilities in 44 countries spread across five continents with over 190,000 employees. Within the automotive industry, it is one of the leading global manufacturers of exterior rearview mirrors, wiring harnesses and polymer modules and has a diversified industry-leading portfolio of auto ancillary products and services that make it a full system solutions provider for its customers across the globe. Driven by technology and innovation, Motherson connects these attributes with creativity, employee participation and performance excellence to create world-class products, services and solutions for its customers globally. Motherson believes its employees are its partners in progress, its biggest asset. The organisation nurtures an environment where employees thrive as dynamic professionals and individuals. The organisation is responsive to the professional aspirations of its employees and provides them with a plethora of growth opportunities, allowing them to grow and evolve professionally and spearhead strategic positions within the organisation.

NAICS: 3361
NAICS Definition: Motor Vehicle Manufacturing
Employees: 22,717
Subsidiaries: 15
12-month incidents
0
Known data breaches
0
Attack type number
0

Nissan Motor Corporation

1-1, Takashima 1-chome,, None, Yokohama-shi, Kanagawa, JP, 220-8686
Last Update: 2025-12-11
Between 650 and 699

Nissan Motor Corporation is a global car manufacturer that sells a full line of vehicles under the Nissan and INFINITI brands. Nissan’s global headquarters in Yokohama, Japan, manages operations in four regions: Japan-ASEAN, China, Americas, and AMIEO (Africa, Middle East, India, Europe & Oceania). For more information about our products, services and commitment to sustainable mobility, visit nissan-global.com. You can also follow us on Facebook, Instagram, Twitter and LinkedIn and see all our latest videos on YouTube.

NAICS: 3361
NAICS Definition: Motor Vehicle Manufacturing
Employees: 45,615
Subsidiaries: 7
12-month incidents
0
Known data breaches
2
Attack type number
3

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/mothersongroup.jpeg
Motherson Group
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/nissan-motor-corporation.jpeg
Nissan Motor Corporation
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Motherson Group
100%
Compliance Rate
0/4 Standards Verified
Nissan Motor Corporation
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Motor Vehicle Manufacturing Industry Average (This Year)

No incidents recorded for Motherson Group in 2025.

Incidents vs Motor Vehicle Manufacturing Industry Average (This Year)

No incidents recorded for Nissan Motor Corporation in 2025.

Incident History — Motherson Group (X = Date, Y = Severity)

Motherson Group cyber incidents detection timeline including parent company and subsidiaries

Incident History — Nissan Motor Corporation (X = Date, Y = Severity)

Nissan Motor Corporation cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/mothersongroup.jpeg
Motherson Group
Incidents

No Incident

https://images.rankiteo.com/companyimages/nissan-motor-corporation.jpeg
Nissan Motor Corporation
Incidents

Date Detected: 12/2023
Type:Data Leak
Blog: Blog

Date Detected: 11/2023
Type:Breach
Blog: Blog

Date Detected: 06/2022
Type:Data Leak
Blog: Blog

FAQ

Motherson Group company demonstrates a stronger AI Cybersecurity Score compared to Nissan Motor Corporation company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Nissan Motor Corporation company has historically faced a number of disclosed cyber incidents, whereas Motherson Group company has not reported any.

In the current year, Nissan Motor Corporation company and Motherson Group company have not reported any cyber incidents.

Neither Nissan Motor Corporation company nor Motherson Group company has reported experiencing a ransomware attack publicly.

Nissan Motor Corporation company has disclosed at least one data breach, while Motherson Group company has not reported such incidents publicly.

Nissan Motor Corporation company has reported targeted cyberattacks, while Motherson Group company has not reported such incidents publicly.

Neither Motherson Group company nor Nissan Motor Corporation company has reported experiencing or disclosing vulnerabilities publicly.

Neither Motherson Group nor Nissan Motor Corporation holds any compliance certifications.

Neither company holds any compliance certifications.

Motherson Group company has more subsidiaries worldwide compared to Nissan Motor Corporation company.

Nissan Motor Corporation company employs more people globally than Motherson Group company, reflecting its scale as a Motor Vehicle Manufacturing.

Neither Motherson Group nor Nissan Motor Corporation holds SOC 2 Type 1 certification.

Neither Motherson Group nor Nissan Motor Corporation holds SOC 2 Type 2 certification.

Neither Motherson Group nor Nissan Motor Corporation holds ISO 27001 certification.

Neither Motherson Group nor Nissan Motor Corporation holds PCI DSS certification.

Neither Motherson Group nor Nissan Motor Corporation holds HIPAA certification.

Neither Motherson Group nor Nissan Motor Corporation holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

NXLog Agent before 6.11 can load a file specified by the OPENSSL_CONF environment variable.

Risk Information
cvss3
Base: 8.1
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Description

uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.

Risk Information
cvss3
Base: 2.9
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
Description

A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:P/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

MJML through 4.18.0 allows mj-include directory traversal to test file existence and (in the type="css" case) read files. NOTE: this issue exists because of an incomplete fix for CVE-2020-12827.

Risk Information
cvss3
Base: 4.5
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:L
Description

A half-blind Server Side Request Forgery (SSRF) vulnerability exists in kube-controller-manager when using the in-tree Portworx StorageClass. This vulnerability allows authorized users to leak arbitrary information from unprotected endpoints in the control plane’s host network (including link-local or loopback services).

Risk Information
cvss3
Base: 5.8
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N