Company Details
motorolasolutions
25,588
652,419
517
motorolasolutions.com
338
MOT_1890634
Completed

Motorola Solutions Company CyberSecurity Posture
motorolasolutions.comAbout Motorola Solutions | Solving for safer Safety and security are at the heart of everything we do at Motorola Solutions. We build and connect technologies to help protect people, property and places. Our solutions foster the collaboration that’s critical for safer communities, safer schools, safer hospitals, safer businesses, and ultimately, safer nations. Learn more about our commitment to innovating for a safer future for us all at www.motorolasolutions.com.
Company Details
motorolasolutions
25,588
652,419
517
motorolasolutions.com
338
MOT_1890634
Completed
Between 750 and 799

Motorola Solutions Global Score (TPRM)XXXX

Description: Motorola's ALPR system has suffered a significant data breach, exposing live video feeds and detailed vehicle records including license plates, car makes, models, and colors across the US. The breach occurred due to misconfiguration, allowing unrestricted internet access to real-time surveillance data without any authentication requirement. This information was meant for law enforcement use, but the flaw discovered by a security researcher led to unintentional public exposure, compromising vehicle owner privacy and highlighting the potential for surveillance abuse.


Motorola Solutions has 21.95% more incidents than the average of same-industry companies with at least one recorded incident.
Motorola Solutions has 28.21% more incidents than the average of all companies with at least one recorded incident.
Motorola Solutions reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 0 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.
Motorola Solutions cyber incidents detection timeline including parent company and subsidiaries

About Motorola Solutions | Solving for safer Safety and security are at the heart of everything we do at Motorola Solutions. We build and connect technologies to help protect people, property and places. Our solutions foster the collaboration that’s critical for safer communities, safer schools, safer hospitals, safer businesses, and ultimately, safer nations. Learn more about our commitment to innovating for a safer future for us all at www.motorolasolutions.com.


Safaricom is the leading provider of converged communication solutions in Kenya. In addition to providing a broad range of first-class products and services for Telephony, Broadband Internet and Financial services, Safaricom seeks to uplift the welfare of Kenyans through value-added services and sup

Telefónica is today one of the largest telecommunications companies in the world in terms of market capitalisation and number of customers. We have the best infrastructure, as well as an innovative range of digital and data services; therefore, we are favorably positioned to meet the needs of our cu

T-Mobile US, Inc. (NASDAQ: TMUS) is America’s supercharged Un-carrier, delivering an advanced 4G LTE and transformative nationwide 5G network that will offer reliable connectivity for all. T-Mobile’s customers benefit from its unmatched combination of value and quality, unwavering obsession with off

Telkom Business is the business unit dedicated to serving businesses of every type, industry and size in and outside South Africa. The businesses that we serve range from small and medium enterprises (SMEs) to large corporations, government organisations and global enterprises. A sub-brand of the

vivo is a technology company that creates great products based on a design-driven value, with smart devices and intelligent services as its core. The company aims to build a bridge between humans and the digital world. Through unique creativity, vivo provides users with an increasingly convenient mo
Make a new start. A start that will build beautiful relationships, shape millions of ideas. Enable a new way to live, learn, work and play. At Jio, we build products and services of the future to empower billions of Indians make their dreams a reality. Jio is about YOU. Join the movement to make I

EE, part of BT Group, is the largest and most advanced mobile communications company in the UK, delivering mobile and fixed communications services to consumers. We run the UK's biggest and fastest mobile network, having pioneered the UK's first superfast 4G mobile service in October 2012 and was

Rogers is Canada’s communications and entertainment company, driven to connect and entertain Canadians. For more information, please visit rogers.com or investors.rogers.com. Déterminée à connecter et à divertir les Canadiens et Canadiennes, Rogers est la référence canadienne en matière de commu

Telcel (Radiomóvil Dipsa) es subsidiaria de América Móvil, uno de los mayores proveedores de comunicaciones celulares de Latinoamérica, grupo líder con inversiones en telecomunicaciones en varios países del continente americano. Telcel es la empresa de telefonía celular líder en México. Nuestra s
.png)
The prestigious award acknowledges organisations that have demonstrated exceptional leadership and innovation in advancing crime prevention...
The Special Communication and Information Security State Service of the Republic of Azerbaijan (SCISS) selected Motorola Solutions to...
Motorola Solutions' AI strategy fuels dominance in public safety via vertically integrated ecosystem of communications, video,...
Motorola Solutions launches 'AI nutrition labels' detailing AI use in safety tech, boosting transparency on data, control, and purpose for...
Motorola Solutions, Inc. (NYSE:MSI) is one of the 10 Best 52-Week Low Tech Stocks To Buy According to Analysts. On June 23, Motorola...
Motorola Solutions unveils VESTA Hybrid, a 911 offering that packages cloud-based services for public-safety answering points (PSAPs) that...
Register and join the Motorola Solutions Public Safety Threat Alliance (PSTA) on June 4, from 1:00 PM - 1:30 PM EDT.
Contentious new Indian security rules require manufacturers of CCTV cameras to submit hardware, software and source code for assessment in...
Lumen Technologies has hired Mark Hacker as chief legal officer. He will take over from interim CLO Meredith Hayes, who resumes her previous role as deputy GC.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Motorola Solutions is http://www.motorolasolutions.com.
According to Rankiteo, Motorola Solutions’s AI-generated cybersecurity score is 784, reflecting their Fair security posture.
According to Rankiteo, Motorola Solutions currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Motorola Solutions is not certified under SOC 2 Type 1.
According to Rankiteo, Motorola Solutions does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Motorola Solutions is not listed as GDPR compliant.
According to Rankiteo, Motorola Solutions does not currently maintain PCI DSS compliance.
According to Rankiteo, Motorola Solutions is not compliant with HIPAA regulations.
According to Rankiteo,Motorola Solutions is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Motorola Solutions operates primarily in the Telecommunications industry.
Motorola Solutions employs approximately 25,588 people worldwide.
Motorola Solutions presently has no subsidiaries across any sectors.
Motorola Solutions’s official LinkedIn profile has approximately 652,419 followers.
Motorola Solutions is classified under the NAICS code 517, which corresponds to Telecommunications.
No, Motorola Solutions does not have a profile on Crunchbase.
Yes, Motorola Solutions maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/motorolasolutions.
As of December 23, 2025, Rankiteo reports that Motorola Solutions has experienced 1 cybersecurity incidents.
Motorola Solutions has an estimated 9,764 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Title: Motorola ALPR System Data Breach
Description: Motorola's ALPR system has suffered a significant data breach, exposing live video feeds and detailed vehicle records including license plates, car makes, models, and colors across the US. The breach occurred due to misconfiguration, allowing unrestricted internet access to real-time surveillance data without any authentication requirement. This information was meant for law enforcement use, but the flaw discovered by a security researcher led to unintentional public exposure, compromising vehicle owner privacy and highlighting the potential for surveillance abuse.
Type: Data Breach
Attack Vector: Misconfiguration
Vulnerability Exploited: Unrestricted internet access to real-time surveillance data without authentication
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Live video feeds, Vehicle records including license plates, car makes, models, and colors
Systems Affected: ALPR system
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Live Video Feeds, Vehicle Records and .

Entity Name: Motorola
Entity Type: Corporation
Industry: Technology

Type of Data Compromised: Live video feeds, Vehicle records
Sensitivity of Data: High
Personally Identifiable Information: License platesCar makesModelsColors

Root Causes: Misconfiguration,
Most Significant Data Compromised: The most significant data compromised in an incident were Live video feeds, Vehicle records including license plates, car makes, models, and colors and .
Most Significant System Affected: The most significant system affected in an incident was ALPR system.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Live video feeds, Vehicle records including license plates, car makes, models and and colors.
.png)
Marshmallow is a lightweight library for converting complex objects to and from simple Python datatypes. In versions from 3.0.0rc1 to before 3.26.2 and from 4.0.0 to before 4.1.2, Schema.load(data, many=True) is vulnerable to denial of service attacks. A moderately sized request can consume a disproportionate amount of CPU time. This issue has been patched in version 3.26.2 and 4.1.2.
KEDA is a Kubernetes-based Event Driven Autoscaling component. Prior to versions 2.17.3 and 2.18.3, an Arbitrary File Read vulnerability has been identified in KEDA, potentially affecting any KEDA resource that uses TriggerAuthentication to configure HashiCorp Vault authentication. The vulnerability stems from an incorrect or insufficient path validation when loading the Service Account Token specified in spec.hashiCorpVault.credential.serviceAccount. An attacker with permissions to create or modify a TriggerAuthentication resource can exfiltrate the content of any file from the node's filesystem (where the KEDA pod resides) by directing the file's content to a server under their control, as part of the Vault authentication request. The potential impact includes the exfiltration of sensitive system information, such as secrets, keys, or the content of files like /etc/passwd. This issue has been patched in versions 2.17.3 and 2.18.3.
Fedify is a TypeScript library for building federated server apps powered by ActivityPub. Prior to versions 1.6.13, 1.7.14, 1.8.15, and 1.9.2, a Regular Expression Denial of Service (ReDoS) vulnerability exists in Fedify's document loader. The HTML parsing regex at packages/fedify/src/runtime/docloader.ts:259 contains nested quantifiers that cause catastrophic backtracking when processing maliciously crafted HTML responses. This issue has been patched in versions 1.6.13, 1.7.14, 1.8.15, and 1.9.2.
Authenticated Remote Code Execution (RCE) in PluXml CMS 5.8.22 allows an attacker with administrator panel access to inject a malicious PHP webshell into a theme file (e.g., home.php).
An issue was discovered in Xiongmai XM530 IP cameras on firmware V5.00.R02.000807D8.10010.346624.S.ONVIF 21.06. The GetStreamUri exposes RTSP URIs containing hardcoded credentials enabling direct unauthorized video stream access.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.