Badge
11,371 badges added since 01 January 2025
ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Established in 1974 as a subsidiary of Samsung Electronics, we’re proud to be recognized as one of the leading chip manufacturers in the world. Using our knowledge in semiconductor technology, our ambition is to spark the imagination of device manufacturers with top-of-the-line building blocks and, through that, enrich the lives of people around the world with transformative solutions.

Samsung Semiconductor A.I CyberSecurity Scoring

Samsung Semiconductor

Company Details

Linkedin ID:

samsungsemiconductor

Employees number:

9,594

Number of followers:

478,938

NAICS:

3344

Industry Type:

Semiconductor Manufacturing

Homepage:

https://semiconductor.samsung.com/

IP Addresses:

0

Company ID:

SAM_7706933

Scan Status:

In-progress

AI scoreSamsung Semiconductor Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/samsungsemiconductor.jpeg
Samsung Semiconductor Semiconductor Manufacturing
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreSamsung Semiconductor Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/samsungsemiconductor.jpeg
Samsung Semiconductor Semiconductor Manufacturing
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Samsung Semiconductor Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsSupply Chain SourceIncident DetailsView
Samsung SemiconductorVulnerability8548/2025NA
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Samsung patched CVE-2025-21043, a critical remote code execution (RCE) vulnerability in libimagecodec.quram.so, a closed-source image parsing library by Quramsoft. The flaw, an out-of-bounds write weakness, allowed attackers to inject malicious code via specially crafted image files, compromising devices without user interaction (zero-click). Exploited in live attacks since August 2025, it posed a severe risk to Android 13–16 devices, including those using WhatsApp and other messaging apps.The vulnerability granted attackers direct access to user data, potentially enabling data theft, surveillance, or further system compromise. While Samsung’s September 2025 Security Maintenance Release addressed the issue, delayed patching left users exposed to active exploitation. Security experts emphasized the urgency of updates, warning that unpatched devices remained vulnerable to highly targeted campaigns, similar to a prior WhatsApp zero-click flaw (CVE-2025-55177) chained with an Apple zero-day.The incident underscores the criticality of third-party library risks and the need for proactive patch management to mitigate large-scale breaches. Failure to update could result in widespread data exposure, financial fraud, or further supply-chain attacks leveraging the same library.

Samsung
Vulnerability
Severity: 85
Impact: 4
Seen: 8/2025
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Samsung patched CVE-2025-21043, a critical remote code execution (RCE) vulnerability in libimagecodec.quram.so, a closed-source image parsing library by Quramsoft. The flaw, an out-of-bounds write weakness, allowed attackers to inject malicious code via specially crafted image files, compromising devices without user interaction (zero-click). Exploited in live attacks since August 2025, it posed a severe risk to Android 13–16 devices, including those using WhatsApp and other messaging apps.The vulnerability granted attackers direct access to user data, potentially enabling data theft, surveillance, or further system compromise. While Samsung’s September 2025 Security Maintenance Release addressed the issue, delayed patching left users exposed to active exploitation. Security experts emphasized the urgency of updates, warning that unpatched devices remained vulnerable to highly targeted campaigns, similar to a prior WhatsApp zero-click flaw (CVE-2025-55177) chained with an Apple zero-day.The incident underscores the criticality of third-party library risks and the need for proactive patch management to mitigate large-scale breaches. Failure to update could result in widespread data exposure, financial fraud, or further supply-chain attacks leveraging the same library.

Ailogo

Samsung Semiconductor Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Samsung Semiconductor

Incidents vs Semiconductor Manufacturing Industry Average (This Year)

No incidents recorded for Samsung Semiconductor in 2026.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Samsung Semiconductor in 2026.

Incident Types Samsung Semiconductor vs Semiconductor Manufacturing Industry Avg (This Year)

No incidents recorded for Samsung Semiconductor in 2026.

Incident History — Samsung Semiconductor (X = Date, Y = Severity)

Samsung Semiconductor cyber incidents detection timeline including parent company and subsidiaries

Samsung Semiconductor Company Subsidiaries

SubsidiaryImage

Established in 1974 as a subsidiary of Samsung Electronics, we’re proud to be recognized as one of the leading chip manufacturers in the world. Using our knowledge in semiconductor technology, our ambition is to spark the imagination of device manufacturers with top-of-the-line building blocks and, through that, enrich the lives of people around the world with transformative solutions.

Loading...
similarCompanies

Samsung Semiconductor Similar Companies

Renesas Electronics

Renesas is an embedded semiconductor solution provider driven by its Purpose ‘To Make Our Lives Easier.’ As the industry’s leading expert in embedded processing with unmatched quality and system-level know-how, we have evolved to provide scalable and comprehensive semiconductor solutions for automot

Established in 1987, TSMC is the world's first dedicated semiconductor foundry. As the founder and a leader of the Dedicated IC Foundry segment, TSMC has built its reputation by offering advanced and "More-than-Moore"​ wafer production processes and unparalleled manufacturing efficiency. From its in

Marvell Technology

We believe that infrastructure powers progress. That execution is as essential as innovation. That better collaboration builds better technology. At Marvell, We go all in with you. Focused and determined, we unite behind your goals as our own. We leverage our unrivaled portfolio of infrastructure t

Applied Materials

Applied Materials is the leader in materials engineering solutions that are at the foundation of virtually every new semiconductor and advanced display in the world. The technology we create is essential to advancing AI and accelerating the commercialization of next-generation chips. At Applied, we

MediaTek

MediaTek Incorporated (TWSE: 2454) is a global fabless semiconductor company that enables nearly 2 billion connected devices a year. We are a market leader in developing innovative systems-on-chip (SoC) for mobile, home entertainment, connectivity and IoT products. Our dedication to innovation has p

GlobalFoundries

GlobalFoundries (GF) is one of the world’s leading semiconductor manufacturers. GF is redefining innovation and semiconductor manufacturing by developing and delivering feature-rich process technology solutions that provide leadership performance in pervasive high growth markets. GF offers a unique

Intel Corporation

Our mission is to shape the future of technology to help create a better future for the entire world, that’s the power of Intel Inside. With more ingenuity and creativity inside, our work is at the heart of countless innovations. From major breakthroughs to things that make everyday life better— the

Analog Devices

Analog Devices, Inc. (NASDAQ: ADI) is a global semiconductor leader that bridges the physical and digital worlds to enable breakthroughs at the Intelligent Edge. ADI combines analog, digital, and software technologies into solutions that help drive advancements in digitized factories, mobility, and

Who are we? ASML is an innovation leader in the global semiconductor industry. We make machines that chipmakers use to mass produce microchips. Founded in 1984 in the Netherlands with just a handful of employees, we’ve now grown to over 40,000 employees, 143 nationalities and more than 60 locations

newsone

Samsung Semiconductor CyberSecurity News

January 21, 2026 05:07 AM
EU to Remove Huawei 5G Equipment in 3 Years

The European Union (EU) is expected to remove Chinese telecommunications equipment and electronic products due to cybersecurity threats.

January 19, 2026 08:26 AM
Samsung Electronics has transfused an EU digital policy expert from Big Tech Microsoft (MS) in the U..

Samsung Electronics has transfused an EU digital policy expert from Big Tech Microsoft (MS) in the U.S. to respond to strict digital...

January 19, 2026 12:23 AM
Samsung Electronics Recruits Former Microsoft EU Affairs Expert to Strengthen Response to EU Regulations

Samsung Electronics has recruited Jeremy Rollison, a 46-year-old expert formerly with Microsoft (MS), to respond to the European Union's...

January 13, 2026 08:00 AM
India Demands Source Code for Cybersecurity Standards

India, which has emerged as a global smartphone production hub, has reportedly demanded that smartphone manufacturers such as Samsung...

January 07, 2026 08:39 AM
Thales Powers CES-Winning Post-Quantum Chip from Samsung Ele

Thales' secure operating system (OS) supports Samsung's security chip, winner of the CES 2026 'Best Cybersecurity Innovation' Award.

January 06, 2026 07:16 PM
Thales Powers CES-winning Post-quantum Chip from Samsung Electronics

Quantum computers, with their unprecedented processing power, will ultimately challenge today's encryption standards - Samsung.com / ThalesGroup.com.

January 06, 2026 08:00 AM
Thales Powers CES*-Winning Post-Quantum Chip From Samsung Electronics

Thales' secure operating system (OS) supports Samsung's security chip, winner of the CES 2026 'Best Cybersecurity Innovation' Award.

December 19, 2025 08:00 AM
Samsung Celebrated for Transformative Tech by Consumer Technology Association

Samsung Electronics is closing out 2025 with a strong signal of where its future tech ambitions lie. The company has secured multiple CES...

November 17, 2025 08:00 AM
Samsung Automotive Storage: Industry’s First to Achieve CSMS ML3 Certification

Samsung achieves CSMS ML3 certification, strengthening security across automotive UFS and SSD products and leading cybersecurity innovation.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Samsung Semiconductor CyberSecurity History Information

Official Website of Samsung Semiconductor

The official website of Samsung Semiconductor is https://semiconductor.samsung.com/.

Samsung Semiconductor’s AI-Generated Cybersecurity Score

According to Rankiteo, Samsung Semiconductor’s AI-generated cybersecurity score is 782, reflecting their Fair security posture.

How many security badges does Samsung Semiconductor’ have ?

According to Rankiteo, Samsung Semiconductor currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Has Samsung Semiconductor been affected by any supply chain cyber incidents ?

According to Rankiteo, Samsung Semiconductor has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.

Does Samsung Semiconductor have SOC 2 Type 1 certification ?

According to Rankiteo, Samsung Semiconductor is not certified under SOC 2 Type 1.

Does Samsung Semiconductor have SOC 2 Type 2 certification ?

According to Rankiteo, Samsung Semiconductor does not hold a SOC 2 Type 2 certification.

Does Samsung Semiconductor comply with GDPR ?

According to Rankiteo, Samsung Semiconductor is not listed as GDPR compliant.

Does Samsung Semiconductor have PCI DSS certification ?

According to Rankiteo, Samsung Semiconductor does not currently maintain PCI DSS compliance.

Does Samsung Semiconductor comply with HIPAA ?

According to Rankiteo, Samsung Semiconductor is not compliant with HIPAA regulations.

Does Samsung Semiconductor have ISO 27001 certification ?

According to Rankiteo,Samsung Semiconductor is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Samsung Semiconductor

Samsung Semiconductor operates primarily in the Semiconductor Manufacturing industry.

Number of Employees at Samsung Semiconductor

Samsung Semiconductor employs approximately 9,594 people worldwide.

Subsidiaries Owned by Samsung Semiconductor

Samsung Semiconductor presently has no subsidiaries across any sectors.

Samsung Semiconductor’s LinkedIn Followers

Samsung Semiconductor’s official LinkedIn profile has approximately 478,938 followers.

NAICS Classification of Samsung Semiconductor

Samsung Semiconductor is classified under the NAICS code 3344, which corresponds to Semiconductor and Other Electronic Component Manufacturing.

Samsung Semiconductor’s Presence on Crunchbase

No, Samsung Semiconductor does not have a profile on Crunchbase.

Samsung Semiconductor’s Presence on LinkedIn

Yes, Samsung Semiconductor maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/samsungsemiconductor.

Cybersecurity Incidents Involving Samsung Semiconductor

As of January 24, 2026, Rankiteo reports that Samsung Semiconductor has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

Samsung Semiconductor has an estimated 1,279 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Samsung Semiconductor ?

Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability.

How does Samsung Semiconductor detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with meta security teams, third party assistance with whatsapp security teams, and containment measures with september 2025 security maintenance release (patch), and remediation measures with patch for cve-2025-21043, remediation measures with additional patches from google and samsung semiconductor, and communication strategy with public advisory for users to update devices, communication strategy with expert recommendations (e.g., black duck)..

Incident Details

Can you provide details on each incident ?

Incident : Vulnerability Exploitation

Title: Samsung Patches Critical Remote Code Execution Vulnerability (CVE-2025-21043) in Android Devices

Description: Samsung has patched a serious security vulnerability (CVE-2025-21043) in its Android devices, which was actively exploited by hackers. The flaw, an out-of-bounds write weakness in the closed-source image parsing library 'libimagecodec.quram.so' (developed by Quramsoft), allowed attackers to execute remote code by sending malicious image files. Users could be compromised without interaction. The issue was reported in August 2025 by Meta and WhatsApp security teams and addressed in Samsung's September 2025 Security Maintenance Release. The update also includes patches for other high/critical flaws affecting Android 13–16 devices.

Date Detected: 2025-08

Date Publicly Disclosed: 2025-09

Date Resolved: 2025-09

Type: Vulnerability Exploitation

Attack Vector: Malicious Image FilesClosed-Source Library Exploitation (libimagecodec.quram.so)

Vulnerability Exploited: CVE-2025-21043 (Out-of-Bounds Write in libimagecodec.quram.so)

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Vulnerability.

How does the company identify the attack vectors used in incidents ?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Malicious Image Files via Messaging Apps (e.g. and WhatsApp).

Impact of the Incidents

What was the impact of each incident ?

Incident : Vulnerability Exploitation SAM2902029091525

Data Compromised: Potential user data (via rce)

Systems Affected: Samsung Android Devices (Android 13–16)

Brand Reputation Impact: Potential Reputation Risk Due to Critical Vulnerability

Identity Theft Risk: ['High (if RCE led to data exfiltration)']

Which entities were affected by each incident ?

Incident : Vulnerability Exploitation SAM2902029091525

Entity Name: Samsung Electronics

Entity Type: Corporation

Industry: Technology (Consumer Electronics)

Location: Suwon, South Korea

Size: Large (Global)

Customers Affected: Samsung Android Users (Android 13–16)

Incident : Vulnerability Exploitation SAM2902029091525

Entity Name: WhatsApp (Meta)

Entity Type: Subsidiary

Industry: Technology (Messaging)

Location: Menlo Park, California, USA

Size: Large (Global)

Customers Affected: Potential WhatsApp Users on Samsung Devices

Incident : Vulnerability Exploitation SAM2902029091525

Entity Name: Quramsoft

Entity Type: Software Vendor

Industry: Software Development

Location: Yongin, South Korea

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Vulnerability Exploitation SAM2902029091525

Incident Response Plan Activated: True

Third Party Assistance: Meta Security Teams, Whatsapp Security Teams.

Containment Measures: September 2025 Security Maintenance Release (Patch)

Remediation Measures: Patch for CVE-2025-21043Additional Patches from Google and Samsung Semiconductor

Communication Strategy: Public Advisory for Users to Update DevicesExpert Recommendations (e.g., Black Duck)

How does the company involve third-party assistance in incident response ?

Third-Party Assistance: The company involves third-party assistance in incident response through Meta Security Teams, WhatsApp Security Teams, .

Data Breach Information

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Patch for CVE-2025-21043, Additional Patches from Google and Samsung Semiconductor, .

How does the company handle incidents involving personally identifiable information (PII) ?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by september 2025 security maintenance release (patch) and .

Lessons Learned and Recommendations

What lessons were learned from each incident ?

Incident : Vulnerability Exploitation SAM2902029091525

Lessons Learned: Critical vulnerabilities in closed-source libraries can have wide-ranging impacts across multiple apps/devices., Zero-click exploits underscore the need for proactive patching even without user interaction., Collaboration between vendors (Samsung, Meta/WhatsApp) is essential for rapid mitigation.

What recommendations were made to prevent future incidents ?

Incident : Vulnerability Exploitation SAM2902029091525

Recommendations: Users should immediately install the September 2025 security update., Organizations should prioritize patch management for third-party libraries., Monitor for unusual activity in messaging apps (e.g., WhatsApp) as potential attack vectors., Adopt security hygiene practices like enabling automatic updates.Users should immediately install the September 2025 security update., Organizations should prioritize patch management for third-party libraries., Monitor for unusual activity in messaging apps (e.g., WhatsApp) as potential attack vectors., Adopt security hygiene practices like enabling automatic updates.Users should immediately install the September 2025 security update., Organizations should prioritize patch management for third-party libraries., Monitor for unusual activity in messaging apps (e.g., WhatsApp) as potential attack vectors., Adopt security hygiene practices like enabling automatic updates.Users should immediately install the September 2025 security update., Organizations should prioritize patch management for third-party libraries., Monitor for unusual activity in messaging apps (e.g., WhatsApp) as potential attack vectors., Adopt security hygiene practices like enabling automatic updates.

What are the key lessons learned from past incidents ?

Key Lessons Learned: The key lessons learned from past incidents are Critical vulnerabilities in closed-source libraries can have wide-ranging impacts across multiple apps/devices.,Zero-click exploits underscore the need for proactive patching even without user interaction.,Collaboration between vendors (Samsung, Meta/WhatsApp) is essential for rapid mitigation.

References

Where can I find more information about each incident ?

Incident : Vulnerability Exploitation SAM2902029091525

Source: Samsung Security Advisory (September 2025)

Incident : Vulnerability Exploitation SAM2902029091525

Source: Meta/WhatsApp Security Bulletin (August 2025)

Incident : Vulnerability Exploitation SAM2902029091525

Source: Black Duck (Nivedita Murthy, Senior Staff Consultant)

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Samsung Security Advisory (September 2025), and Source: Meta/WhatsApp Security Bulletin (August 2025), and Source: Black Duck (Nivedita Murthy, Senior Staff Consultant).

Investigation Status

What is the current status of the investigation for each incident ?

Incident : Vulnerability Exploitation SAM2902029091525

Investigation Status: Resolved (Patched)

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public Advisory For Users To Update Devices, Expert Recommendations (E.G. and Black Duck).

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : Vulnerability Exploitation SAM2902029091525

Stakeholder Advisories: Public Patch Release, Expert Commentary (E.G., Black Duck).

Customer Advisories: Urgent update notification for Samsung Android users

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Public Patch Release, Expert Commentary (E.G., Black Duck), Urgent Update Notification For Samsung Android Users and .

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : Vulnerability Exploitation SAM2902029091525

Entry Point: Malicious Image Files Via Messaging Apps (E.G., Whatsapp),

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : Vulnerability Exploitation SAM2902029091525

Root Causes: Out-Of-Bounds Write Vulnerability In Quramsoft'S Libimagecodec.Quram.So Library., Lack Of Input Validation For Image File Parsing., Delayed Patching Timeline (Reported In August, Patched In September).,

Corrective Actions: Released September 2025 Security Maintenance Release With Cve-2025-21043 Patch., Collaborated With Meta/Whatsapp For Vulnerability Disclosure., Included Additional Patches For Related Flaws In Android 13–16.,

What is the company's process for conducting post-incident analysis ?

Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Meta Security Teams, Whatsapp Security Teams, .

What corrective actions has the company taken based on post-incident analysis ?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Released September 2025 Security Maintenance Release With Cve-2025-21043 Patch., Collaborated With Meta/Whatsapp For Vulnerability Disclosure., Included Additional Patches For Related Flaws In Android 13–16., .

Additional Questions

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2025-08.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-09.

What was the most recent incident resolved ?

Most Recent Incident Resolved: The most recent incident resolved was on 2025-09.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were Potential User Data (via RCE) and .

What was the most significant system affected in an incident ?

Most Significant System Affected: The most significant system affected in an incident was Samsung Android Devices (Android 13–16).

Response to the Incidents

What third-party assistance was involved in the most recent incident ?

Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was meta security teams, whatsapp security teams, .

What containment measures were taken in the most recent incident ?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was September 2025 Security Maintenance Release (Patch).

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Potential User Data (via RCE).

Lessons Learned and Recommendations

What was the most significant lesson learned from past incidents ?

Most Significant Lesson Learned: The most significant lesson learned from past incidents was Collaboration between vendors (Samsung, Meta/WhatsApp) is essential for rapid mitigation.

What was the most significant recommendation implemented to improve cybersecurity ?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Adopt security hygiene practices like enabling automatic updates., Monitor for unusual activity in messaging apps (e.g., WhatsApp) as potential attack vectors., Users should immediately install the September 2025 security update. and Organizations should prioritize patch management for third-party libraries..

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident are Samsung Security Advisory (September 2025), Meta/WhatsApp Security Bulletin (August 2025), Black Duck (Nivedita Murthy and Senior Staff Consultant).

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Resolved (Patched).

Stakeholder and Customer Advisories

What was the most recent stakeholder advisory issued ?

Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Public patch release, Expert commentary (e.g., Black Duck), .

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued was an Urgent update notification for Samsung Android users.

Initial Access Broker

cve

Latest Global CVEs (Not Company-Specific)

Description

Typemill is a flat-file, Markdown-based CMS designed for informational documentation websites. A reflected Cross-Site Scripting (XSS) exists in the login error view template `login.twig` of versions 2.19.1 and below. The `username` value can be echoed back without proper contextual encoding when authentication fails. An attacker can execute script in the login page context. This issue has been fixed in version 2.19.2.

Risk Information
cvss3
Base: 5.4
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Description

A DOM-based Cross-Site Scripting (XSS) vulnerability exists in the DomainCheckerApp class within domain/script.js of Sourcecodester Domain Availability Checker v1.0. The vulnerability occurs because the application improperly handles user-supplied data in the createResultElement method by using the unsafe innerHTML property to render domain search results.

Description

A Remote Code Execution (RCE) vulnerability exists in Sourcecodester Modern Image Gallery App v1.0 within the gallery/upload.php component. The application fails to properly validate uploaded file contents. Additionally, the application preserves the user-supplied file extension during the save process. This allows an unauthenticated attacker to upload arbitrary PHP code by spoofing the MIME type as an image, leading to full system compromise.

Description

A UNIX symbolic link following issue in the jailer component in Firecracker version v1.13.1 and earlier and 1.14.0 on Linux may allow a local host user with write access to the pre-created jailer directories to overwrite arbitrary host files via a symlink attack during the initialization copy at jailer startup, if the jailer is executed with root privileges. To mitigate this issue, users should upgrade to version v1.13.2 or 1.14.1 or above.

Risk Information
cvss3
Base: 6.0
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
cvss4
Base: 6.0
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

An information disclosure vulnerability exists in the /srvs/membersrv/getCashiers endpoint of the Aptsys gemscms backend platform thru 2025-05-28. This unauthenticated endpoint returns a list of cashier accounts, including names, email addresses, usernames, and passwords hashed using MD5. As MD5 is a broken cryptographic function, the hashes can be easily reversed using public tools, exposing user credentials in plaintext. This allows remote attackers to perform unauthorized logins and potentially gain access to sensitive POS operations or backend functions.

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=samsungsemiconductor' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge