Company Details
visionpoint-eye-center-llc
33
96
621
visionpointeye.com
0
VIS_2422080
In-progress


VisionPoint Eye Center LLC Company CyberSecurity Posture
visionpointeye.comVisionPoint Eye Center was established in 2019 after the merger of four well-established eye care practices in the Bloomington-Normal community. These practices and doctors shared the vision of serving their patients better by combining expert routine and specialized services in one, central eye care facility conveniently located at 1107 Airport Road, Bloomington, IL 61704
Company Details
visionpoint-eye-center-llc
33
96
621
visionpointeye.com
0
VIS_2422080
In-progress
Between 650 and 699

VECL Global Score (TPRM)XXXX

Description: VisionPoint Eye Center Reaches $750K Settlement Over 2024 Data Breach Affecting 67,000 Patients VisionPoint Eye Center, a central Illinois-based ophthalmology and optometry provider, has agreed to a $750,000 settlement to resolve class action litigation stemming from a data breach discovered in October 2024. The incident, which exposed the protected health information of 66,924 individuals, occurred after an unauthorized third party accessed the organization’s network on or around October 3, 2024. Compromised data included names, medical record numbers, health insurance details, and other sensitive medical information. The breach prompted five class action lawsuits, later consolidated into *Davis, et al. v. VisionPoint Eye Center* in the Illinois Circuit Court of the Eleventh Judicial Circuit. Plaintiffs alleged negligence, breach of fiduciary duty, and violations of the Illinois Consumer Fraud and Deceptive Business Practices Act, arguing that VisionPoint failed to implement adequate security measures. The healthcare provider denies all claims, citing the settlement as a cost-effective resolution amid litigation risks. Under the agreement, a $750,000 fund will cover legal fees, administrative costs, and compensation for affected individuals. Class members may claim two years of credit monitoring or opt for one of two cash benefits: reimbursement of documented breach-related losses (up to $2,500 per person) or a one-time payment expected to be $45, subject to pro rata adjustments based on claim volume. The settlement received preliminary court approval, with deadlines set for February 2, 2026 (opt-out/object) and March 3, 2026 (claim submissions). A final fairness hearing is scheduled for March 2, 2026. The breach was reported to the HHS’ Office for Civil Rights in compliance with federal regulations.


No incidents recorded for VisionPoint Eye Center LLC in 2026.
No incidents recorded for VisionPoint Eye Center LLC in 2026.
No incidents recorded for VisionPoint Eye Center LLC in 2026.
VECL cyber incidents detection timeline including parent company and subsidiaries

VisionPoint Eye Center was established in 2019 after the merger of four well-established eye care practices in the Bloomington-Normal community. These practices and doctors shared the vision of serving their patients better by combining expert routine and specialized services in one, central eye care facility conveniently located at 1107 Airport Road, Bloomington, IL 61704


Hamad Medical Corporation (HMC) is the main provider of secondary and tertiary healthcare in Qatar and one of the leading hospital providers in the Middle East. For more than three decades, HMC has been dedicated to delivering the safest, most effective and compassionate care to all its patients.
.png)
Our HIPAA breach news section covers HIPAA breaches such as unauthorized disclosures of protected health information (PHI), improper disposal of PHI.
The HIPAA Journal legal news section contains details of the latest enforcement activities by the Department of Health and Human Services' Office for Civil...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of VisionPoint Eye Center LLC is http://www.visionpointeye.com.
According to Rankiteo, VisionPoint Eye Center LLC’s AI-generated cybersecurity score is 656, reflecting their Weak security posture.
According to Rankiteo, VisionPoint Eye Center LLC currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, VisionPoint Eye Center LLC has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, VisionPoint Eye Center LLC is not certified under SOC 2 Type 1.
According to Rankiteo, VisionPoint Eye Center LLC does not hold a SOC 2 Type 2 certification.
According to Rankiteo, VisionPoint Eye Center LLC is not listed as GDPR compliant.
According to Rankiteo, VisionPoint Eye Center LLC does not currently maintain PCI DSS compliance.
According to Rankiteo, VisionPoint Eye Center LLC is not compliant with HIPAA regulations.
According to Rankiteo,VisionPoint Eye Center LLC is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
VisionPoint Eye Center LLC operates primarily in the Medical Practices industry.
VisionPoint Eye Center LLC employs approximately 33 people worldwide.
VisionPoint Eye Center LLC presently has no subsidiaries across any sectors.
VisionPoint Eye Center LLC’s official LinkedIn profile has approximately 96 followers.
VisionPoint Eye Center LLC is classified under the NAICS code 621, which corresponds to Ambulatory Health Care Services.
No, VisionPoint Eye Center LLC does not have a profile on Crunchbase.
Yes, VisionPoint Eye Center LLC maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/visionpoint-eye-center-llc.
As of January 22, 2026, Rankiteo reports that VisionPoint Eye Center LLC has experienced 1 cybersecurity incidents.
VisionPoint Eye Center LLC has an estimated 9,096 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Total Financial Loss: The total financial loss from these incidents is estimated to be $750 thousand.
Title: VisionPoint Eye Center Data Breach
Description: An unauthorized third party gained access to VisionPoint Eye Center's network and potentially stole files containing patient data, including names, medical record numbers, health insurance information, and medical information.
Date Detected: 2024-10-03
Type: Data Breach
Threat Actor: Unauthorized third party
Common Attack Types: The most common types of attacks the company has faced is Breach.

Financial Loss: $750,000 settlement fund
Data Compromised: Names, medical record numbers, health insurance information, medical information
Systems Affected: Network
Legal Liabilities: Class action litigation
Identity Theft Risk: High
Average Financial Loss: The average financial loss per incident is $750.00 thousand.
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Protected Health Information (PHI).

Entity Name: VisionPoint Eye Center
Entity Type: Healthcare Provider
Industry: Ophthalmology and Optometry
Location: Central Illinois
Customers Affected: 66,924 individuals

Type of Data Compromised: Protected Health Information (PHI)
Number of Records Exposed: 66,924
Sensitivity of Data: High
Data Exfiltration: Potential
Personally Identifiable Information: Names, medical record numbers, health insurance information

Regulations Violated: HIPAA
Legal Actions: Class action lawsuit (Davis, et al. v. VisionPoint Eye Center)
Regulatory Notifications: Reported to HHS’ Office for Civil Rights
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Class action lawsuit (Davis, et al. v. VisionPoint Eye Center).

Source: HIPAA Journal
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: HIPAA Journal.

Investigation Status: Settlement agreed

Customer Advisories: Class members may claim credit monitoring services or cash benefits
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Class members may claim credit monitoring services or cash benefits.

Root Causes: Inadequate security measures and non-adherence to industry-standard security best practices
Last Attacking Group: The attacking group in the last incident was an Unauthorized third party.
Most Recent Incident Detected: The most recent incident detected was on 2024-10-03.
Highest Financial Loss: The highest financial loss from an incident was $750,000 settlement fund.
Most Significant Data Compromised: The most significant data compromised in an incident were Names, medical record numbers, health insurance information and medical information.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Names, medical record numbers, health insurance information and medical information.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 66.9K.
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Class action lawsuit (Davis, et al. v. VisionPoint Eye Center).
Most Recent Source: The most recent source of information about an incident is HIPAA Journal.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Settlement agreed.
Most Recent Customer Advisory: The most recent customer advisory issued was an Class members may claim credit monitoring services or cash benefits.
.png)
SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g., execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.