ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

As head of the Department of Law, the Attorney General is both the “People's Lawyer” and the State's chief legal officer. As the “People's Lawyer,” the Attorney General serves as the guardian of the legal rights of the citizens of New York, its organizations and its natural resources. In fulfilling the duties of the State’s chief legal counsel, the Attorney General not only advises the Executive branch of State government, but also defends actions and proceedings on behalf of the State. The Attorney General serves all New Yorkers in numerous matters affecting their daily lives.The Attorney General's Office is charged with the statutory and common law powers to protect consumers and investors, charitable donors, the public health and environment, civil rights, and the rights of wage-earners and businesses across the State. The Attorney General's authority also includes the activities and investigations of the State Organized Crime Task Force and Medicaid Fraud Control Unit. While the Attorney General acts independently of the Governor, the Governor or a state agency may request the Attorney General to undertake specific criminal investigations and prosecutions. The legal functions of the Department of Law are divided primarily into five major divisions: Appeals and Opinions, State Counsel, Criminal Justice, Economic Justice and Social Justice. Over 1,800 employees, including over 700 attorneys, as well as forensic accountants, legal assistants, scientists, investigators, and support staff, serve in the Office of the Attorney General in many locations across New York State.

Office of the New York State Attorney General A.I CyberSecurity Scoring

ONYSAG

Company Details

Linkedin ID:

office-of-the-attorney-general-of-the-state-of-new-york

Employees number:

1,605

Number of followers:

17,310

NAICS:

92212

Industry Type:

Law Enforcement

Homepage:

ny.gov

IP Addresses:

0

Company ID:

OFF_1952810

Scan Status:

In-progress

AI scoreONYSAG Risk Score (AI oriented)

Between 650 and 699

https://images.rankiteo.com/companyimages/office-of-the-attorney-general-of-the-state-of-new-york.jpeg
ONYSAG Law Enforcement
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreONYSAG Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/office-of-the-attorney-general-of-the-state-of-new-york.jpeg
ONYSAG Law Enforcement
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

ONYSAG Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
State Attorney General’s OfficeBreach8548/2025
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: In August 2025, the **State Attorney General’s Office** detected a **cybersecurity incident** involving unauthorized access to files containing **personal data**, including **names, Social Security numbers, and medical information**. While the investigation found no evidence of misuse or attempted misuse of the compromised data, the breach exposed sensitive information of an undisclosed number of individuals. The office engaged cybersecurity experts, implemented additional security measures, and reported the incident to the **FBI**. Affected individuals were notified in November 2025 and offered **identity protection services**. The breach underscores vulnerabilities in handling **personally identifiable information (PII)**, though no financial fraud, public disclosure, or systemic disruption was confirmed. The office emphasized its commitment to privacy and urged affected parties to monitor financial accounts and credit reports for suspicious activity.

State Attorney General’s Office
Breach
Severity: 85
Impact: 4
Seen: 8/2025
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: In August 2025, the **State Attorney General’s Office** detected a **cybersecurity incident** involving unauthorized access to files containing **personal data**, including **names, Social Security numbers, and medical information**. While the investigation found no evidence of misuse or attempted misuse of the compromised data, the breach exposed sensitive information of an undisclosed number of individuals. The office engaged cybersecurity experts, implemented additional security measures, and reported the incident to the **FBI**. Affected individuals were notified in November 2025 and offered **identity protection services**. The breach underscores vulnerabilities in handling **personally identifiable information (PII)**, though no financial fraud, public disclosure, or systemic disruption was confirmed. The office emphasized its commitment to privacy and urged affected parties to monitor financial accounts and credit reports for suspicious activity.

Ailogo

ONYSAG Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for ONYSAG

Incidents vs Law Enforcement Industry Average (This Year)

Office of the New York State Attorney General has 63.93% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs All-Companies Average (This Year)

Office of the New York State Attorney General has 56.25% more incidents than the average of all companies with at least one recorded incident.

Incident Types ONYSAG vs Law Enforcement Industry Avg (This Year)

Office of the New York State Attorney General reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 0 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.

Incident History — ONYSAG (X = Date, Y = Severity)

ONYSAG cyber incidents detection timeline including parent company and subsidiaries

ONYSAG Company Subsidiaries

SubsidiaryImage

As head of the Department of Law, the Attorney General is both the “People's Lawyer” and the State's chief legal officer. As the “People's Lawyer,” the Attorney General serves as the guardian of the legal rights of the citizens of New York, its organizations and its natural resources. In fulfilling the duties of the State’s chief legal counsel, the Attorney General not only advises the Executive branch of State government, but also defends actions and proceedings on behalf of the State. The Attorney General serves all New Yorkers in numerous matters affecting their daily lives.The Attorney General's Office is charged with the statutory and common law powers to protect consumers and investors, charitable donors, the public health and environment, civil rights, and the rights of wage-earners and businesses across the State. The Attorney General's authority also includes the activities and investigations of the State Organized Crime Task Force and Medicaid Fraud Control Unit. While the Attorney General acts independently of the Governor, the Governor or a state agency may request the Attorney General to undertake specific criminal investigations and prosecutions. The legal functions of the Department of Law are divided primarily into five major divisions: Appeals and Opinions, State Counsel, Criminal Justice, Economic Justice and Social Justice. Over 1,800 employees, including over 700 attorneys, as well as forensic accountants, legal assistants, scientists, investigators, and support staff, serve in the Office of the Attorney General in many locations across New York State.

Loading...
similarCompanies

ONYSAG Similar Companies

Metropolitan Police

The Metropolitan Police Service is famed around the world and has a unique place in the history of policing. Our headquarters at New Scotland Yard - and its iconic revolving sign - has provided the backdrop to some of the most high profile and complex law enforcement investigations the world has e

Policing in South Africa. I am attached to the newly formed Directorate for Priority Crime Investigations. Formally I was attached to the Detecitve Service and have been conduction investigations for over 25 years. I have also been attached to the National Inspectorate Division of the SAPS for soem

FBI Virtual Training Academy

The FBI Virtual Academy is the portal to all FBI training opportunities offered to our external partners. FBI Virtual Academy registration is open to all personnel serving in any agency within the criminal justice or intelligence community – including state, local, tribal, and international law enfo

Government of India

he Government of India, officially known as the Union Government, and also known as the Central Government, was established by the Constitution of India, and is the governing authority of a union of 28 states and seven union territories, collectively called the Republic of India. It is seated in New

Singapore Police Force

The Singapore Police Force (SPF) is a uniformed organisation under the purview of the Ministry of Home Affairs. The mission of the SPF is to prevent, deter and detect crime to ensure the safety and security of Singapore. The Singapore Police Force’s official LinkedIn page should NOT be used for

New York City Police Department

Welcome to the Official NYPD LinkedIn Page. For emergencies, dial 911. To submit crime tips & information, visit www.NYPDcrimestoppers.com or call 800-577-TIPS. The mission of the New York City Police Department is to enhance the quality of life in New York City by working in partnership with the c

GENDARMERIA NACIONAL ARGENTINA

Gendarmería Nacional Argentina (GNA) es una Fuerza de Seguridad de naturaleza militar, que cumple funciones en la seguridad interior, defensa nacional, auxilio a la Justicia Federal y apoyo a la Política Exterior de la RA. Es una de las cuatro Fuerzas que integran el Ministerio de Seguridad de l

Swedish Police Authority

Vi gör hela Sverige tryggt och säkert! Att arbeta inom polisen är ett av de finaste uppdrag man kan ha. Du bidrar till samhället genom att göra hela Sverige tryggt och säkert. Oavsett om du jobbar i en civil roll eller som polis, är möjligheterna att växa med en större uppgift många. Vi är Sverig

Politie Nederland

Politiemensen staan midden in de maatschappij, dicht op het nieuws. De politie is daar waar het gebeurt. Het optreden van agenten ligt altijd onder een vergrootglas. Bij de politie ben je 24 uur per dag en voor iedereen in onze diverse samenleving. Integer, moedig, betrouwbaar en verbindend zijn daa

newsone

ONYSAG CyberSecurity News

November 19, 2025 03:57 PM
Key Takeaways From California, Connecticut, and New York's $5.1M Settlement With Education Technology Company

Background On November 6, California Attorney General (AG) Rob Bonta, Connecticut AG William Tong, and New York AG Letitia James announced a...

November 12, 2025 08:00 AM
Algorithmic Pricing Disclosure Act takes effect

ROCHESTER, N.Y. — New York's Algorithmic Pricing Disclosure Act took effect earlier this week. The law requires companies to clearly state...

October 27, 2025 07:00 AM
New York State attorney general discovers firm had two data breaches

On October 20, the New York State attorney general, in a press release, announced a settlement with a certified public accounting firm after...

October 22, 2025 07:00 AM
New York fines eight auto insurers $19 million over cybersecurity violations

New York State Department of Financial Services (DFS) Superintendent Adrienne A. Harris has collected more than $19 million in penalties for...

October 14, 2025 07:00 AM
New York fines auto insurers $19M over major data breaches

New York State has fined eight major auto insurance companies over $19 million after an investigation uncovered major cybersecurity failures...

October 09, 2025 07:00 AM
Filing fee increase for submissions to the New York State Attorney General–Real Estate Finance Bureau: What you need to know

The 2025–2026 New York State budget bill increased filing fees for offering plans, no-action letter applications, cooperative policy...

October 09, 2025 07:00 AM
Letitia James, NY attorney general and Trump foe, indicted for mortgage fraud

New York Attorney General Letitia James, a longtime foe of President Donald Trump, was charged on Thursday with lying on a mortgage...

September 15, 2025 07:00 AM
Article | Politically influential law firm under investigation by New York AG

NEW YORK — State Attorney General Letitia James' office is investigating medical debt collection practices employed by Abrams Fensterman,...

August 22, 2025 07:00 AM
New York Attorney General Sues Zelle Developer for Inadequate Account Security and Verification Measures

New York Attorney General Letitia James announces filing of lawsuit against Early Warning Services, LLC for alleged insufficient security...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

ONYSAG CyberSecurity History Information

Official Website of Office of the New York State Attorney General

The official website of Office of the New York State Attorney General is http://www.ag.ny.gov/job-postings.

Office of the New York State Attorney General’s AI-Generated Cybersecurity Score

According to Rankiteo, Office of the New York State Attorney General’s AI-generated cybersecurity score is 697, reflecting their Weak security posture.

How many security badges does Office of the New York State Attorney General’ have ?

According to Rankiteo, Office of the New York State Attorney General currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Office of the New York State Attorney General have SOC 2 Type 1 certification ?

According to Rankiteo, Office of the New York State Attorney General is not certified under SOC 2 Type 1.

Does Office of the New York State Attorney General have SOC 2 Type 2 certification ?

According to Rankiteo, Office of the New York State Attorney General does not hold a SOC 2 Type 2 certification.

Does Office of the New York State Attorney General comply with GDPR ?

According to Rankiteo, Office of the New York State Attorney General is not listed as GDPR compliant.

Does Office of the New York State Attorney General have PCI DSS certification ?

According to Rankiteo, Office of the New York State Attorney General does not currently maintain PCI DSS compliance.

Does Office of the New York State Attorney General comply with HIPAA ?

According to Rankiteo, Office of the New York State Attorney General is not compliant with HIPAA regulations.

Does Office of the New York State Attorney General have ISO 27001 certification ?

According to Rankiteo,Office of the New York State Attorney General is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Office of the New York State Attorney General

Office of the New York State Attorney General operates primarily in the Law Enforcement industry.

Number of Employees at Office of the New York State Attorney General

Office of the New York State Attorney General employs approximately 1,605 people worldwide.

Subsidiaries Owned by Office of the New York State Attorney General

Office of the New York State Attorney General presently has no subsidiaries across any sectors.

Office of the New York State Attorney General’s LinkedIn Followers

Office of the New York State Attorney General’s official LinkedIn profile has approximately 17,310 followers.

NAICS Classification of Office of the New York State Attorney General

Office of the New York State Attorney General is classified under the NAICS code 92212, which corresponds to Police Protection.

Office of the New York State Attorney General’s Presence on Crunchbase

No, Office of the New York State Attorney General does not have a profile on Crunchbase.

Office of the New York State Attorney General’s Presence on LinkedIn

Yes, Office of the New York State Attorney General maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/office-of-the-attorney-general-of-the-state-of-new-york.

Cybersecurity Incidents Involving Office of the New York State Attorney General

As of November 28, 2025, Rankiteo reports that Office of the New York State Attorney General has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

Office of the New York State Attorney General has an estimated 1,471 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Office of the New York State Attorney General ?

Incident Types: The types of cybersecurity incidents that have occurred include Breach.

How does Office of the New York State Attorney General detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with cybersecurity experts engaged, and and remediation measures with security measures implemented to prevent future incidents, and recovery measures with identity protection services offered to affected individuals, and communication strategy with emailed notices sent to affected individuals (nov. 14, 2025); public advisory issued with protective guidance..

Incident Details

Can you provide details on each incident ?

Incident : Data Breach / Unauthorized Access

Title: Data Security Incident at State Attorney General’s Office

Description: A cybersecurity incident detected on Aug. 9, 2025, involved potential unauthorized access to personal information, including names, Social Security numbers, and/or medical information. While no evidence of misuse was found, the office took security measures and offered identity protection services to affected individuals. The incident was reported to the FBI, and notices were emailed to affected parties on Nov. 14, 2025.

Date Detected: 2025-08-09

Date Publicly Disclosed: 2025-11-14

Type: Data Breach / Unauthorized Access

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Breach.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach / Unauthorized Access OFF3532135111525

Data Compromised: Names, Social security numbers, Medical information

Brand Reputation Impact: Potential concern due to exposure of sensitive personal data

Identity Theft Risk: High (due to exposure of SSNs and medical data)

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personally Identifiable Information (Pii), Protected Health Information (Phi) and .

Which entities were affected by each incident ?

Incident : Data Breach / Unauthorized Access OFF3532135111525

Entity Name: State Attorney General’s Office

Entity Type: Government Agency

Industry: Legal / Public Sector

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Data Breach / Unauthorized Access OFF3532135111525

Incident Response Plan Activated: True

Third Party Assistance: Cybersecurity experts engaged

Remediation Measures: Security measures implemented to prevent future incidents

Recovery Measures: Identity protection services offered to affected individuals

Communication Strategy: Emailed notices sent to affected individuals (Nov. 14, 2025); public advisory issued with protective guidance

How does the company involve third-party assistance in incident response ?

Third-Party Assistance: The company involves third-party assistance in incident response through Cybersecurity experts engaged.

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach / Unauthorized Access OFF3532135111525

Type of Data Compromised: Personally identifiable information (pii), Protected health information (phi)

Sensitivity of Data: High (SSNs, medical records)

Personally Identifiable Information: namesSocial Security numbersmedical information

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Security measures implemented to prevent future incidents.

Ransomware Information

How does the company recover data encrypted by ransomware ?

Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Identity protection services offered to affected individuals.

Regulatory Compliance

Were there any regulatory violations and fines imposed for each incident ?

Incident : Data Breach / Unauthorized Access OFF3532135111525

Regulatory Notifications: FBI notified; cooperation ongoing

Lessons Learned and Recommendations

What recommendations were made to prevent future incidents ?

Incident : Data Breach / Unauthorized Access OFF3532135111525

Recommendations: Monitor financial accounts for suspicious activity (e.g., unauthorized transactions, new accounts)., Request free annual credit reports from TransUnion, Experian, and Equifax via www.annualcreditreport.com or 1-877-322-8228., Follow FTC guidelines to protect against identity theft (www.ftc.gov)., Contact the Attorney General’s office at 1-833-353-8060 for assistance.Monitor financial accounts for suspicious activity (e.g., unauthorized transactions, new accounts)., Request free annual credit reports from TransUnion, Experian, and Equifax via www.annualcreditreport.com or 1-877-322-8228., Follow FTC guidelines to protect against identity theft (www.ftc.gov)., Contact the Attorney General’s office at 1-833-353-8060 for assistance.Monitor financial accounts for suspicious activity (e.g., unauthorized transactions, new accounts)., Request free annual credit reports from TransUnion, Experian, and Equifax via www.annualcreditreport.com or 1-877-322-8228., Follow FTC guidelines to protect against identity theft (www.ftc.gov)., Contact the Attorney General’s office at 1-833-353-8060 for assistance.Monitor financial accounts for suspicious activity (e.g., unauthorized transactions, new accounts)., Request free annual credit reports from TransUnion, Experian, and Equifax via www.annualcreditreport.com or 1-877-322-8228., Follow FTC guidelines to protect against identity theft (www.ftc.gov)., Contact the Attorney General’s office at 1-833-353-8060 for assistance.

References

Where can I find more information about each incident ?

Incident : Data Breach / Unauthorized Access OFF3532135111525

Source: State Attorney General’s Office Public Advisory

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: State Attorney General’s Office Public Advisory.

Investigation Status

What is the current status of the investigation for each incident ?

Incident : Data Breach / Unauthorized Access OFF3532135111525

Investigation Status: Ongoing (cooperation with FBI)

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Emailed notices sent to affected individuals (Nov. 14 and 2025); public advisory issued with protective guidance.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : Data Breach / Unauthorized Access OFF3532135111525

Stakeholder Advisories: Public statement issued with protective guidance for affected individuals.

Customer Advisories: Emailed notices (Nov. 14, 2025) with instructions for credit monitoring and identity protection.

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Public statement issued with protective guidance for affected individuals., Emailed notices (Nov. 14 and 2025) with instructions for credit monitoring and identity protection..

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : Data Breach / Unauthorized Access OFF3532135111525

Corrective Actions: Security measures implemented to prevent recurrence

What is the company's process for conducting post-incident analysis ?

Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Cybersecurity experts engaged.

What corrective actions has the company taken based on post-incident analysis ?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Security measures implemented to prevent recurrence.

Additional Questions

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2025-08-09.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-11-14.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were names, Social Security numbers, medical information and .

Response to the Incidents

What third-party assistance was involved in the most recent incident ?

Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Cybersecurity experts engaged.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were medical information, names and Social Security numbers.

Lessons Learned and Recommendations

What was the most significant recommendation implemented to improve cybersecurity ?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Monitor financial accounts for suspicious activity (e.g., unauthorized transactions, new accounts)., Request free annual credit reports from TransUnion, Experian, and Equifax via www.annualcreditreport.com or 1-877-322-8228., Follow FTC guidelines to protect against identity theft (www.ftc.gov). and Contact the Attorney General’s office at 1-833-353-8060 for assistance..

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident is State Attorney General’s Office Public Advisory.

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing (cooperation with FBI).

Stakeholder and Customer Advisories

What was the most recent stakeholder advisory issued ?

Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Public statement issued with protective guidance for affected individuals., .

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued were an Emailed notices (Nov. 14 and 2025) with instructions for credit monitoring and identity protection.

cve

Latest Global CVEs (Not Company-Specific)

Description

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.

Risk Information
cvss4
Base: 7.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 6.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=office-of-the-attorney-general-of-the-state-of-new-york' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge