ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

The National Association of Counties (NACo) is the only national organization that represents county governments in the United States. Founded in 1935, NACo assists America’s 3,069 counties in pursuing excellence in public service to produce healthy, vibrant, safe and resilient counties. NACo promotes sound public policies, fosters county solutions and innovation, promotes intergovernmental and public-private collaboration and provides value-added services to save counties and taxpayers money. With its headquarters on Capitol Hill, NACo is a full-service organization that delivers its services through its dedicated and skilled staff who comprise the following departments: Executive Management, Legislative Affairs, Public Affairs, County Solutions and Innovation, Information Technology, Finance and Administration and the Financial Service Corporation.​

National Association of Counties A.I CyberSecurity Scoring

NAC

Company Details

Linkedin ID:

nacodc

Employees number:

183

Number of followers:

21,910

NAICS:

921

Industry Type:

Public Policy Offices

Homepage:

naco.org

IP Addresses:

0

Company ID:

NAT_6650210

Scan Status:

In-progress

AI scoreNAC Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/nacodc.jpeg
NAC Public Policy Offices
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreNAC Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/nacodc.jpeg
NAC Public Policy Offices
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

NAC Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
U.S. County Governments (Collective)Vulnerability100610/2025
Rankiteo Explanation :
Attack threatening the economy of geographical region

Description: Researchers from the University of Maryland uncovered systemic cybersecurity vulnerabilities across **3,095 U.S. county governments**, exposing **42,735 internet-facing devices** (98% of all counties) to potential exploits. The study revealed critical gaps in security measures for public-facing nodes, databases, and online services—including school boards, wastewater systems, housing, elections, and emergency response infrastructure. Counties, often constrained by limited budgets, lack visibility into their cyberattack surface, making them prime targets for hackers seeking initial attack vectors. The exposed vulnerabilities (e.g., unpatched CVEs) risk compromising **sensitive citizen data**, disrupting **essential services** (water, elections, police response), and enabling cascading attacks on regional economies. While the researchers avoided active probing to prevent exacerbating risks, passive reconnaissance (via OSINT tools like Shodan/Censys) confirmed that poor cyber resilience at the local level could lead to **disastrous societal consequences**, including service outages, data breaches, or even threats to public safety if critical infrastructure (e.g., water treatment) is targeted.

U.S. County Governments (Collective)
Vulnerability
Severity: 100
Impact: 6
Seen: 10/2025
Blog:
Rankiteo Explanation
Attack threatening the economy of geographical region

Description: Researchers from the University of Maryland uncovered systemic cybersecurity vulnerabilities across **3,095 U.S. county governments**, exposing **42,735 internet-facing devices** (98% of all counties) to potential exploits. The study revealed critical gaps in security measures for public-facing nodes, databases, and online services—including school boards, wastewater systems, housing, elections, and emergency response infrastructure. Counties, often constrained by limited budgets, lack visibility into their cyberattack surface, making them prime targets for hackers seeking initial attack vectors. The exposed vulnerabilities (e.g., unpatched CVEs) risk compromising **sensitive citizen data**, disrupting **essential services** (water, elections, police response), and enabling cascading attacks on regional economies. While the researchers avoided active probing to prevent exacerbating risks, passive reconnaissance (via OSINT tools like Shodan/Censys) confirmed that poor cyber resilience at the local level could lead to **disastrous societal consequences**, including service outages, data breaches, or even threats to public safety if critical infrastructure (e.g., water treatment) is targeted.

Ailogo

NAC Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for NAC

Incidents vs Public Policy Offices Industry Average (This Year)

National Association of Counties has 20.48% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs All-Companies Average (This Year)

National Association of Counties has 56.25% more incidents than the average of all companies with at least one recorded incident.

Incident Types NAC vs Public Policy Offices Industry Avg (This Year)

National Association of Counties reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 1 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.

Incident History — NAC (X = Date, Y = Severity)

NAC cyber incidents detection timeline including parent company and subsidiaries

NAC Company Subsidiaries

SubsidiaryImage

The National Association of Counties (NACo) is the only national organization that represents county governments in the United States. Founded in 1935, NACo assists America’s 3,069 counties in pursuing excellence in public service to produce healthy, vibrant, safe and resilient counties. NACo promotes sound public policies, fosters county solutions and innovation, promotes intergovernmental and public-private collaboration and provides value-added services to save counties and taxpayers money. With its headquarters on Capitol Hill, NACo is a full-service organization that delivers its services through its dedicated and skilled staff who comprise the following departments: Executive Management, Legislative Affairs, Public Affairs, County Solutions and Innovation, Information Technology, Finance and Administration and the Financial Service Corporation.​

Loading...
similarCompanies

NAC Similar Companies

Foundation for Alcohol Research and Education (FARE)

The Foundation for Alcohol Research and Education (FARE) is the leading not-for-profit organisation working towards an Australia free from alcohol harms. We approach this through developing evidence-informed policy, enabling people-powered advocacy and delivering health promotion programs. Austr

Texas Center for Justice and Equity

TCJE advances solutions and builds coalitions to end mass incarceration and foster safer Texas communities. Our three, often-intersecting goals are as follows: * Reverse the pipeline that pushes people into the justice system. We are fighting to reduce the number of people entering the system, i

National Grain and Feed Association

The National Grain and Feed Association, founded in 1896, is a broad-based, non-profit trade association that represents and provides services for grain, feed and related commercial businesses. Its activities focus on enhancing the growth and economic performance of U.S. agriculture. NGFA member

HQN provides fast practical guidance on everything to do with housing. We’ve got everything covered – repairs and maintenance, housing management, governance, health and safety, lettings and allocations, estate services and more. Turn to us for advice and guidance on the hot topics – value for

Virginia Department of Business Assistance

The Virginia Department of Business Assistance, created by the Virginia General Assembly in 1996, provides a one-stop-service for technical assistance related to business formation, access to capital, and workforce development. VDBA works with existing businesses as they grow their workforce and men

Fay-Penn Economic Development Council

Fay-Penn Economic Development Council's mission is to maintain and increase employment opportunities (jobs) in Fayette County in an effort to improve the quality of life for all of its residents. This mission is met through a comprehensive strategy of specific #economicdevelopment objectives. The or

newsone

NAC CyberSecurity News

November 21, 2025 01:30 PM
MACo’s Inaugural Information Technology Conference

County professionals and technology partners from across Maryland convened on November 20 for the inaugural MACo IT Affiliate Conference.

November 20, 2025 04:07 PM
U.S. House Passes Reauthorization Bill for the State and Local Cybersecurity Grant Program

The U.S. House passed a bill to reauthorize the State and Local Cybersecurity Grant Program, a key priority for counties · NACo supports the reauthorization...

November 18, 2025 06:54 PM
Full renewal of state and local cyber grants program passes in House

The PILLAR Act, which would renew federal cybersecurity grants to state and local governments for 10 years, passed by voice vote in the...

October 09, 2025 07:00 AM
NACo Cyber Awareness Month Deal: Build Cyber Leadership Skills for Just $1,000

During Cybersecurity Awareness Month (October), the National Association of Counties (NACo) is offering exclusive scholarships that reduce...

October 07, 2025 09:25 PM
Cyber Resilience In Action: County Leaders Share Their Strategies

Join county IT leaders to hear how they are defending local government systems, staff, and constituents from ever-increasing cyber-attacks.

September 30, 2025 07:00 AM
US Cuts Federal Funding for MS-ISAC Cybersecurity Program

The Trump administration wants CISA to transition to a “new model” for supporting local government agencies' cyber strategy.

September 22, 2025 07:00 AM
Fort Bend County Hosts 77th Annual State Treasurers Conference

The 77th Annual County Treasurers' Association of Texas Conference brought together county treasurers, financial leaders and policymakers...

September 18, 2025 07:00 AM
Governors, mayors, CIOs sign letter supporting state and local cyber grant reauthorization

Groups including the National Governors Association and NASCIO have signed a letter asking Congress to reauthorize the State and Local...

September 17, 2025 07:00 AM
NGA Joins State and Local Government Leaders, Urges Congress to Preserve State and Local Cyber Security Grant Program

The Honorable John Thune Majority Leader U.S. Senate 511 Dirksen Senate Office Building Washington, D.C. 20510. The Honorable Chuck Schumer

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

NAC CyberSecurity History Information

Official Website of National Association of Counties

The official website of National Association of Counties is http://www.naco.org.

National Association of Counties’s AI-Generated Cybersecurity Score

According to Rankiteo, National Association of Counties’s AI-generated cybersecurity score is 751, reflecting their Fair security posture.

How many security badges does National Association of Counties’ have ?

According to Rankiteo, National Association of Counties currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does National Association of Counties have SOC 2 Type 1 certification ?

According to Rankiteo, National Association of Counties is not certified under SOC 2 Type 1.

Does National Association of Counties have SOC 2 Type 2 certification ?

According to Rankiteo, National Association of Counties does not hold a SOC 2 Type 2 certification.

Does National Association of Counties comply with GDPR ?

According to Rankiteo, National Association of Counties is not listed as GDPR compliant.

Does National Association of Counties have PCI DSS certification ?

According to Rankiteo, National Association of Counties does not currently maintain PCI DSS compliance.

Does National Association of Counties comply with HIPAA ?

According to Rankiteo, National Association of Counties is not compliant with HIPAA regulations.

Does National Association of Counties have ISO 27001 certification ?

According to Rankiteo,National Association of Counties is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of National Association of Counties

National Association of Counties operates primarily in the Public Policy Offices industry.

Number of Employees at National Association of Counties

National Association of Counties employs approximately 183 people worldwide.

Subsidiaries Owned by National Association of Counties

National Association of Counties presently has no subsidiaries across any sectors.

National Association of Counties’s LinkedIn Followers

National Association of Counties’s official LinkedIn profile has approximately 21,910 followers.

NAICS Classification of National Association of Counties

National Association of Counties is classified under the NAICS code 921, which corresponds to Executive, Legislative, and Other General Government Support.

National Association of Counties’s Presence on Crunchbase

No, National Association of Counties does not have a profile on Crunchbase.

National Association of Counties’s Presence on LinkedIn

Yes, National Association of Counties maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/nacodc.

Cybersecurity Incidents Involving National Association of Counties

As of November 28, 2025, Rankiteo reports that National Association of Counties has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

National Association of Counties has an estimated 1,023 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at National Association of Counties ?

Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability.

How does National Association of Counties detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with passive reconnaissance to avoid exacerbating vulnerabilities, containment measures with secure python application for data analysis, and communication strategy with publication in *journal of cybersecurity* (january 2025), communication strategy with media outreach to raise awareness, and enhanced monitoring with recommendation for counties to adopt continuous monitoring via osint tools (e.g., shodan, censys)..

Incident Details

Can you provide details on each incident ?

Incident : Research Study

Title: Holistic Assessment of U.S. County Governments' Cyber Attack Surface

Description: Researchers at the University of Maryland conducted a study to assess the cyber attack surface of U.S. county governments, identifying vulnerabilities in 42,735 internet-facing devices across 3,095 counties (98% of all U.S. counties). The study, published in January 2025 in the *Journal of Cybersecurity*, highlighted systemic gaps in cybersecurity resilience at the county level, emphasizing risks to sensitive citizen data, emergency services, elections, water supply, and local economies. The research relied on passive reconnaissance tools (e.g., Shodan, Censys) and OSINT to map vulnerabilities without exacerbating risks. Key findings underscore the urgency of addressing cybersecurity in underfunded local governments, which are often targeted as 'weakest links' by threat actors.

Date Publicly Disclosed: 2025-01

Type: Research Study

Vulnerability Exploited: Unspecified CVEs identified via Shodan/Censys scansPublic-facing nodes and databases with inadequate security controls

Motivation: Academic ResearchPublic AwarenessPolicy Advocacy

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Vulnerability.

Impact of the Incidents

What was the impact of each incident ?

Incident : Research Study NAC5693056100125

Systems Affected: 42,735 internet-facing devices across 3,095 U.S. counties

Operational Impact: Potential risks to emergency services, elections, water supply, and local economies due to unaddressed vulnerabilities

Brand Reputation Impact: Highlighted systemic neglect of county-level cybersecurity, risking public trust in local government digital services

Identity Theft Risk: ['Sensitive citizen data (e.g., housing, permits, elections) at risk due to inadequate protections']

Which entities were affected by each incident ?

Incident : Research Study NAC5693056100125

Entity Name: U.S. County Governments (3,095 counties, 98% coverage)

Entity Type: Local Government, Public Sector

Industry: Government Administration, Public Services, Critical Infrastructure (e.g., water, elections)

Location: United States (all 50 states)

Size: Varies (small to large counties)

Customers Affected: U.S. citizens relying on county services (e.g., schools, housing, emergency response)

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Research Study NAC5693056100125

Containment Measures: Passive reconnaissance to avoid exacerbating vulnerabilitiesSecure Python application for data analysis

Communication Strategy: Publication in *Journal of Cybersecurity* (January 2025)Media outreach to raise awareness

Enhanced Monitoring: Recommendation for counties to adopt continuous monitoring via OSINT tools (e.g., Shodan, Censys)

Data Breach Information

What type of data was compromised in each breach ?

Incident : Research Study NAC5693056100125

Sensitivity of Data: Potential exposure of citizen data (e.g., housing, permits, elections, emergency services)

Personally Identifiable Information: Risk of PII exposure due to unpatched vulnerabilities in public-facing systems

How does the company handle incidents involving personally identifiable information (PII) ?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by passive reconnaissance to avoid exacerbating vulnerabilities, secure python application for data analysis and .

Lessons Learned and Recommendations

What lessons were learned from each incident ?

Incident : Research Study NAC5693056100125

Lessons Learned: County governments are critically under-resourced for cybersecurity, despite managing sensitive data and infrastructure., Passive reconnaissance tools (e.g., Shodan, Censys) can effectively map attack surfaces without increasing risk., Lack of visibility into county-level vulnerabilities creates systemic risks for elections, emergency services, and public trust., Collaborative research can drive policy changes and resource allocation for local government cybersecurity.

What recommendations were made to prevent future incidents ?

Incident : Research Study NAC5693056100125

Recommendations: Increase funding and resources for county cybersecurity programs., Implement continuous monitoring of public-facing assets using OSINT tools., Develop standardized cybersecurity frameworks tailored to local governments., Prioritize patching of known CVEs in county IT infrastructure., Enhance public-private partnerships to share threat intelligence and best practices.Increase funding and resources for county cybersecurity programs., Implement continuous monitoring of public-facing assets using OSINT tools., Develop standardized cybersecurity frameworks tailored to local governments., Prioritize patching of known CVEs in county IT infrastructure., Enhance public-private partnerships to share threat intelligence and best practices.Increase funding and resources for county cybersecurity programs., Implement continuous monitoring of public-facing assets using OSINT tools., Develop standardized cybersecurity frameworks tailored to local governments., Prioritize patching of known CVEs in county IT infrastructure., Enhance public-private partnerships to share threat intelligence and best practices.Increase funding and resources for county cybersecurity programs., Implement continuous monitoring of public-facing assets using OSINT tools., Develop standardized cybersecurity frameworks tailored to local governments., Prioritize patching of known CVEs in county IT infrastructure., Enhance public-private partnerships to share threat intelligence and best practices.Increase funding and resources for county cybersecurity programs., Implement continuous monitoring of public-facing assets using OSINT tools., Develop standardized cybersecurity frameworks tailored to local governments., Prioritize patching of known CVEs in county IT infrastructure., Enhance public-private partnerships to share threat intelligence and best practices.

What are the key lessons learned from past incidents ?

Key Lessons Learned: The key lessons learned from past incidents are County governments are critically under-resourced for cybersecurity, despite managing sensitive data and infrastructure.,Passive reconnaissance tools (e.g., Shodan, Censys) can effectively map attack surfaces without increasing risk.,Lack of visibility into county-level vulnerabilities creates systemic risks for elections, emergency services, and public trust.,Collaborative research can drive policy changes and resource allocation for local government cybersecurity.

References

Where can I find more information about each incident ?

Incident : Research Study NAC5693056100125

Source: Journal of Cybersecurity (UK)

Date Accessed: 2025-01

Incident : Research Study NAC5693056100125

Source: University of Maryland College of Information Studies

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Journal of Cybersecurity (UK)Date Accessed: 2025-01, and Source: University of Maryland College of Information Studies.

Investigation Status

What is the current status of the investigation for each incident ?

Incident : Research Study NAC5693056100125

Investigation Status: Completed (published in January 2025)

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Publication In *Journal Of Cybersecurity* (January 2025) and Media Outreach To Raise Awareness.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : Research Study NAC5693056100125

Stakeholder Advisories: Urgent Need For Federal/State Support To Address County-Level Cybersecurity Gaps.

Customer Advisories: Citizens advised to monitor county communications for updates on service security

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Urgent Need For Federal/State Support To Address County-Level Cybersecurity Gaps, Citizens Advised To Monitor County Communications For Updates On Service Security and .

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : Research Study NAC5693056100125

High Value Targets: Public-Facing Databases, Election Systems, Emergency Service Networks,

Data Sold on Dark Web: Public-Facing Databases, Election Systems, Emergency Service Networks,

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : Research Study NAC5693056100125

Root Causes: Chronic Underfunding Of County Cybersecurity Programs, Lack Of Standardized Security Protocols Across Local Governments, Limited Visibility Into Attack Surfaces Due To Decentralized It Management, Over-Reliance On Outdated Or Unpatched Systems,

Corrective Actions: Advocate For Federal/State Cybersecurity Grants For Counties, Establish A National Repository For County-Level Vulnerability Data (Anonymized), Mandate Regular Cybersecurity Audits For Local Governments, Develop Training Programs For County It Staff On Threat Detection And Response,

What is the company's process for conducting post-incident analysis ?

Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Recommendation For Counties To Adopt Continuous Monitoring Via Osint Tools (E.G., Shodan, Censys), .

What corrective actions has the company taken based on post-incident analysis ?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Advocate For Federal/State Cybersecurity Grants For Counties, Establish A National Repository For County-Level Vulnerability Data (Anonymized), Mandate Regular Cybersecurity Audits For Local Governments, Develop Training Programs For County It Staff On Threat Detection And Response, .

Additional Questions

Incident Details

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-01.

Impact of the Incidents

What was the most significant system affected in an incident ?

Most Significant System Affected: The most significant system affected in an incident were 42,735 internet-facing devices across 3,095 U.S. counties.

Response to the Incidents

What containment measures were taken in the most recent incident ?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Passive reconnaissance to avoid exacerbating vulnerabilitiesSecure Python application for data analysis.

Lessons Learned and Recommendations

What was the most significant lesson learned from past incidents ?

Most Significant Lesson Learned: The most significant lesson learned from past incidents was Collaborative research can drive policy changes and resource allocation for local government cybersecurity.

What was the most significant recommendation implemented to improve cybersecurity ?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Enhance public-private partnerships to share threat intelligence and best practices., Develop standardized cybersecurity frameworks tailored to local governments., Increase funding and resources for county cybersecurity programs., Implement continuous monitoring of public-facing assets using OSINT tools. and Prioritize patching of known CVEs in county IT infrastructure..

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident are University of Maryland College of Information Studies and Journal of Cybersecurity (UK).

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Completed (published in January 2025).

Stakeholder and Customer Advisories

What was the most recent stakeholder advisory issued ?

Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Urgent need for federal/state support to address county-level cybersecurity gaps, .

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued was an Citizens advised to monitor county communications for updates on service security.

cve

Latest Global CVEs (Not Company-Specific)

Description

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.

Risk Information
cvss4
Base: 7.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 6.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=nacodc' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge