ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

ZTE connects the world with continuous innovation for a better future. The company provides innovative technologies and integrated solutions, and its portfolio spans communication networks, computing infrastructure, industry digital solutions, and personal and home smart terminals. Serving one third of the world's population, ZTE is dedicated to leading globally in connectivity and intelligent computing, enabling communication and trust everywhere. ZTE is listed on both the Hong Kong and Shenzhen Stock Exchanges. For enquiry about our mobile devices, please contact us via [email protected] For network services, please contact our 24/7 support hotline: 0086-755-26771900 or email: [email protected] https://twitter.com/ZTEPress https://www.facebook.com/ZTECorp https://youtube.com/@ZTECorporation

ZTE Corporation A.I CyberSecurity Scoring

ZTE Corporation

Company Details

Linkedin ID:

zte

Employees number:

30,451

Number of followers:

679,842

NAICS:

517

Industry Type:

Telecommunications

Homepage:

zte.com.cn

IP Addresses:

0

Company ID:

ZTE_1574612

Scan Status:

In-progress

AI scoreZTE Corporation Risk Score (AI oriented)

Between 800 and 849

https://images.rankiteo.com/companyimages/zte.jpeg
ZTE Corporation Telecommunications
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreZTE Corporation Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/zte.jpeg
ZTE Corporation Telecommunications
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

ZTE Corporation Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

ZTE Corporation Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for ZTE Corporation

Incidents vs Telecommunications Industry Average (This Year)

No incidents recorded for ZTE Corporation in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for ZTE Corporation in 2025.

Incident Types ZTE Corporation vs Telecommunications Industry Avg (This Year)

No incidents recorded for ZTE Corporation in 2025.

Incident History — ZTE Corporation (X = Date, Y = Severity)

ZTE Corporation cyber incidents detection timeline including parent company and subsidiaries

ZTE Corporation Company Subsidiaries

SubsidiaryImage

ZTE connects the world with continuous innovation for a better future. The company provides innovative technologies and integrated solutions, and its portfolio spans communication networks, computing infrastructure, industry digital solutions, and personal and home smart terminals. Serving one third of the world's population, ZTE is dedicated to leading globally in connectivity and intelligent computing, enabling communication and trust everywhere. ZTE is listed on both the Hong Kong and Shenzhen Stock Exchanges. For enquiry about our mobile devices, please contact us via [email protected] For network services, please contact our 24/7 support hotline: 0086-755-26771900 or email: [email protected] https://twitter.com/ZTEPress https://www.facebook.com/ZTECorp https://youtube.com/@ZTECorporation

Loading...
similarCompanies

ZTE Corporation Similar Companies

BT Group

We’re one of the world’s leading communications services companies. At BT Group, the solutions we sell are integral to modern life. Our purpose is as simple as it is ambitious: we connect for good. There are no limits to what people can do when they connect. And as technology changes our world, co

Welkom bij de LinkedIn pagina van KPN. Sinds jaar en dag maakt KPN technologie toegankelijk. Hier leest u alles over de ontwikkelingen rondom de thema’s die KPN belangrijk vindt, zoals Het Nieuwe Leven & Werken, Veiligheid & Privacy en ICT-infrastructuur. Ook een transparante en betrouwbare dienstve

Ericsson

The future of mobile isn’t on the horizon, it’s happening now. At Ericsson, we’re building the foundation for an open network ecosystem where industries, developers, and enterprises thrive. The convergence of 5G, AI, cloud, and network APIs isn’t just a technological shift; it’s a transformation th

Airtel was founded to provide global connectivity and unlock endless opportunities. Our organization embodies a unique blend of energy, innovation, creativity, dedication, scale, and ownership, all aimed at being limitless. At Airtel, we strive to go beyond our duties to create impactful solutions f

Our 15 000 talented colleagues serve millions of customers every day in one of the world’s most connected regions. With a strong connectivity base, we’re the hub in the digital ecosystem, empowering people, companies and societies to stay in touch with everything that matters 24/7/365 - on their ter

Telefónica

Telefónica is today one of the largest telecommunications companies in the world in terms of market capitalisation and number of customers. We have the best infrastructure, as well as an innovative range of digital and data services; therefore, we are favorably positioned to meet the needs of our cu

Openreach

We’re the people that make the net work. As the nation’s largest wholesale broadband network, we’re rolling out Ultrafast Full Fibre broadband across the UK. It’s our fastest and most reliable broadband yet, and we’re well on our way to making it available to 25m homes and businesses – building the

Safaricom PLC

Safaricom is the leading provider of converged communication solutions in Kenya. In addition to providing a broad range of first-class products and services for Telephony, Broadband Internet and Financial services, Safaricom seeks to uplift the welfare of Kenyans through value-added services and sup

Liberty Global

Liberty Global is a world leader in converged broadband, video and mobile communications and an active investor in cutting-edge infrastructure, content and technology ventures. With our investments in fibre-based and 5G networks we play a vital role in society, currently providing over 85 million f

newsone

ZTE Corporation CyberSecurity News

November 14, 2025 07:31 AM
ZTE: Rooted in tech application to drive social progress

ZTE Corporation has been honored with the Distinguished Contribution Award at this year's World Internet Conference (WIC) Wuzhen Summit,...

September 23, 2025 07:00 AM
Cybersecurity jobs available right now: September 23, 2025

Here are the worldwide cybersecurity job openings available as of September 23, 2025, including on-site, hybrid, and remote roles.

August 21, 2025 07:00 AM
ZTE, Multimedia University team up to advance Malaysia's ICT talent in 5G, AI, digital transformation

Chinese technology company ZTE Corporation announced Thursday the signing of a memorandum of understanding (MoU) with Multimedia University...

August 12, 2025 07:00 AM
Cybersecurity jobs available right now: August 12, 2025

Here are the worldwide cybersecurity job openings available as of August 12, 2025, including on-site, hybrid, and remote roles.

July 07, 2025 07:00 AM
Protecting Against National Security Threats to the Communications Supply Chain through the Equipment Authorization Program

In November 2022, the Federal Communications Commission (FCC) strengthened Equipment Authorization Program rules, prohibiting importation...

July 04, 2025 07:00 AM
ZTE and MMU launch a five-month AI and Cybersecurity Programme in China

Kuala Lumpur, Malaysia, 4 July 2025 - ZTE Corporation (0763.HK / 000063.SZ), a global leading provider of integrated information and...

June 23, 2025 07:00 AM
Federal Liberals reintroduce cybersecurity bill meant to protect critical infrastructure

Ottawa has reintroduced legislation aimed at protecting Canada's critical infrastructure that cybersecurity experts have called long overdue.

May 28, 2025 07:00 AM
Cybersecurity Risk From Kaspersky to TikTok

This article examines three defining initiatives: the banning of products and services offered by the Russia-based cybersecurity company Kaspersky.

April 04, 2025 07:00 AM
Cybersecurity risks in the telecommunications industry

Cybersecurity and data privacy incidents at telecom companies have highlighted vulnerabilities and the need for more proactive strategies...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

ZTE Corporation CyberSecurity History Information

Official Website of ZTE Corporation

The official website of ZTE Corporation is http://www.zte.com.cn/global.

ZTE Corporation’s AI-Generated Cybersecurity Score

According to Rankiteo, ZTE Corporation’s AI-generated cybersecurity score is 801, reflecting their Good security posture.

How many security badges does ZTE Corporation’ have ?

According to Rankiteo, ZTE Corporation currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does ZTE Corporation have SOC 2 Type 1 certification ?

According to Rankiteo, ZTE Corporation is not certified under SOC 2 Type 1.

Does ZTE Corporation have SOC 2 Type 2 certification ?

According to Rankiteo, ZTE Corporation does not hold a SOC 2 Type 2 certification.

Does ZTE Corporation comply with GDPR ?

According to Rankiteo, ZTE Corporation is not listed as GDPR compliant.

Does ZTE Corporation have PCI DSS certification ?

According to Rankiteo, ZTE Corporation does not currently maintain PCI DSS compliance.

Does ZTE Corporation comply with HIPAA ?

According to Rankiteo, ZTE Corporation is not compliant with HIPAA regulations.

Does ZTE Corporation have ISO 27001 certification ?

According to Rankiteo,ZTE Corporation is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of ZTE Corporation

ZTE Corporation operates primarily in the Telecommunications industry.

Number of Employees at ZTE Corporation

ZTE Corporation employs approximately 30,451 people worldwide.

Subsidiaries Owned by ZTE Corporation

ZTE Corporation presently has no subsidiaries across any sectors.

ZTE Corporation’s LinkedIn Followers

ZTE Corporation’s official LinkedIn profile has approximately 679,842 followers.

NAICS Classification of ZTE Corporation

ZTE Corporation is classified under the NAICS code 517, which corresponds to Telecommunications.

ZTE Corporation’s Presence on Crunchbase

No, ZTE Corporation does not have a profile on Crunchbase.

ZTE Corporation’s Presence on LinkedIn

Yes, ZTE Corporation maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/zte.

Cybersecurity Incidents Involving ZTE Corporation

As of November 27, 2025, Rankiteo reports that ZTE Corporation has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

ZTE Corporation has an estimated 9,535 peer or competitor companies worldwide.

ZTE Corporation CyberSecurity History Information

How many cyber incidents has ZTE Corporation faced ?

Total Incidents: According to Rankiteo, ZTE Corporation has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at ZTE Corporation ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.

Risk Information
cvss4
Base: 7.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 6.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=zte' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge