Company Details
audi-ag
23,963
2,037,091
3361
audi.com
0
AUD_1148561
In-progress

AUDI AG Company CyberSecurity Posture
audi.com#WeAreProgress ++ Progress is in our DNA. It’s not just in our cars, but also in us. The focus at Audi is on us – the people – and we are shaping the future of mobility together. With our inner drive. With the aim to continuously improve. With our mindset, courage and confidence. Because progress develops in the mind – and in the heart! Learn more about how we are progress: https://lnkd.in/dKyUjig Impressum: https://www.audi.com/en/legal.html Legal notice: https://www.audi.com/en/legal-notice.html Privacy Policy for Recruiting activities: Datenschutzhinweis (DE): https://karriere.audi.de/sap/bc/bsp/sap/z_hcmx_ui_ext/commons/resources/downloads/Datenschutzhinweis.pdf Data protection note (EN): https://karriere.audi.de/sap/bc/bsp/sap/z_hcmx_ui_ext/commons/resources/downloads/PrivacyPolicy.pdf Community Management: Audi Interaction GmbH (https://www.audiinteraction.com/)
Company Details
audi-ag
23,963
2,037,091
3361
audi.com
0
AUD_1148561
In-progress
Between 800 and 849

AUDI AG Global Score (TPRM)XXXX

Description: Audi has been identified as shipping vehicles (up to at least 2024) with outdated and vulnerable software components, such as **FreeImage**, which lacks active maintenance and contains well-documented security flaws. These vulnerabilities expose connected cars to potential **remote exploits**, **data breaches**, and **system takeovers** via compromised firmware or third-party APIs. The insecure software violates the intent of **UNECE R155** (cybersecurity type approval) but persists due to weak enforcement and a disconnect between regulatory compliance and practical implementation. Attackers could exploit these flaws to manipulate critical vehicle systems (e.g., brakes, steering via CAN bus), exfiltrate sensitive driver data (location history, behavior patterns stored in cloud systems), or deploy **over-the-air (OTA) malware updates** affecting entire fleets. The systemic neglect of security standards—despite legal frameworks like **GDPR** and **ISO/SAE 21434**—undermines consumer trust and leaves drivers exposed to **large-scale cyber-physical attacks**, including scenarios where vehicle control could be hijacked, endangering lives and organizational liability.
Description: The cybercriminal group **Qilin** executed a targeted attack on **Volkswagen Group France**, compromising approximately **150 GB of sensitive data**, including **2,000 files** containing **confidential customer, employee, and business operation details**. The stolen data includes **personal information of vehicle owners** (names, addresses, emails) and **detailed vehicle records** (model designations, chassis numbers, license plates). Six sample documents were leaked as proof. The attack underscores the automotive industry’s vulnerability to **large-scale data breaches**, with extortionists increasingly targeting manufacturers for high-value intellectual property and customer data. The incident follows similar attacks on **BMW and Jaguar Land Rover**, highlighting systemic risks in the sector.
Description: Volkswagen, a leading global automaker, fell victim to a ransomware attack by the group **8Base** in September 2024. The attackers claimed to have breached Volkswagen’s systems, exfiltrating confidential files—including **invoices, accounting records, employee files, contracts, certificates, and confidentiality agreements**—before threatening to leak them on their dark web site. While Volkswagen asserted its **core IT infrastructure remained unaffected**, the incident raised concerns about potential **third-party system compromises** and the broader scope of the breach. The attack employed **Phobos ransomware** and **double-extortion tactics**, heightening risks of data exposure and operational disruption. The leaked information, though not immediately publicized, included sensitive internal documents, posing reputational and financial threats. The limited transparency in Volkswagen’s response further fueled speculation about the attack’s true impact on supply chain dependencies and partner ecosystems.
Description: The Maine Office of the Attorney General reported a data breach involving Volkswagen Group of America, Inc. on June 10, 2021. The breach, which occurred on March 10, 2021, affected over 3.3 million individuals, with approximately 90,000 individuals having sensitive personal information compromised, including driver's license numbers. The breach resulted from a vendor leaving electronic data unsecured between August 2019 and May 2021.
Description: The customer data of Volkswagen Group of America was breached in a cyberattack in March 20221. An unauthorized third party gained access to their servers and stole the information like phone numbers and email addresses, vehicle purchased, leased, or inquired about. More than 3.3 million customers in U.S. and Canadia were affected by the attack.
Description: A carmaker's online dealership portal was found leaking private customer information and vehicle data, allowing unauthorized access to remotely control car functions. A researcher discovered a flaw enabling the creation of an administrator account, granting access to customer data, financial details, and real-time location tracking of vehicles. The vulnerability also permitted pairing vehicles with mobile accounts to unlock cars, posing significant risks of theft and privacy breaches. The automaker fixed the issue after a week of reporting.
Description: A severe vulnerability in the automaker's dealer portal allowed unauthorized attackers to register dealer accounts, escalate privileges to national administrator, and remotely control vehicles. The flaw, stemming from hidden registration forms and weak session token management, enabled attackers to transfer car ownership and send remote commands via the vehicle enrollment API. This exposed all vehicles from 2012 onward with telematics modules, posing significant risks to customer safety and data integrity. The automaker has since patched the issue with stricter token validation and role-based access controls.


No incidents recorded for AUDI AG in 2025.
No incidents recorded for AUDI AG in 2025.
No incidents recorded for AUDI AG in 2025.
AUDI AG cyber incidents detection timeline including parent company and subsidiaries

#WeAreProgress ++ Progress is in our DNA. It’s not just in our cars, but also in us. The focus at Audi is on us – the people – and we are shaping the future of mobility together. With our inner drive. With the aim to continuously improve. With our mindset, courage and confidence. Because progress develops in the mind – and in the heart! Learn more about how we are progress: https://lnkd.in/dKyUjig Impressum: https://www.audi.com/en/legal.html Legal notice: https://www.audi.com/en/legal-notice.html Privacy Policy for Recruiting activities: Datenschutzhinweis (DE): https://karriere.audi.de/sap/bc/bsp/sap/z_hcmx_ui_ext/commons/resources/downloads/Datenschutzhinweis.pdf Data protection note (EN): https://karriere.audi.de/sap/bc/bsp/sap/z_hcmx_ui_ext/commons/resources/downloads/PrivacyPolicy.pdf Community Management: Audi Interaction GmbH (https://www.audiinteraction.com/)


Sumitomo Electric Bordnetze SE (SEBN) is a global automotive supplier with over 36,000 employees in 13 countries. SEBN is part of the Japanese group Sumitomo Electric Industries, which has 380 subsidiaries in various industries worldwide. The more than 400-year-old Sumitomo Electric Group employs 28
We don't just make history -- we make the future. Ford put the world on wheels over a century ago, and our teams are re-inventing icons and creating groundbreaking connected and electric vehicles for the next century. We believe in serving our customers, our communities, and the world. If you do, to

“In the beginning I looked around and could not find quite the car I dreamed of. So I decided to build it myself.“ This quote by Ferry Porsche sums up everything that makes Porsche what it is. It has been our guiding star for more than 75 years. Every day, we search for the best solution with commi

Mercedes-Benz USA, LLC (MBUSA), a Daimler Company, is responsible for the Distribution and Marketing of Mercedes-Benz and smart products in the United States. MBUSA was founded in 1965 and prior to that Mercedes-Benz cars were sold in the United States by Mercedes-Benz Car Sales, Inc., a subsidiary

Adient (NYSE: ADNT) is a global leader in automotive seating. With 70,000+ employees in 29 countries, Adient operates more than 200 manufacturing/assembly plants worldwide. We produce and deliver automotive seating for all major OEMs. From complete seating systems to individual foam, trim and metal

PACCAR is a global technology leader in the design, manufacture and customer support of premium light-, medium- and heavy-duty trucks under the Kenworth, Peterbilt and DAF nameplates. PACCAR also designs and manufactures advanced diesel engines, provides financial services, information technology, a

At the forefront of shaping mobility for over eight decades, driven by a legacy of innovation and an unwavering commitment to excellence. We fuse next-generation technologies with operational precision and continuous value creation — across every vehicle and process. But what truly sets us apart is

Volvo Trucks supplies complete transport solutions for discerning professional customers with its full range of medium- and heavy-duty trucks. Customer support is provided via a global network of dealers with 2,200 service points in about 130 countries. Volvo trucks are assembled in 12 countries acr
Joyson Group is a young, ambitious high-tech company, its headquarter is located in Ningbo, China. With more than 100 bases in 30 countries, over 40000 employees globally. Founded in 2004, Joyson 's main products used to be automotive functional components. Since 2011, the company has acquired se
.png)
Audi unveiled a 2026 concept car with a brand livery in a German launch event. F1 Commission met for the final time this year,...
Collaborative IT/OT cybersecurity can help industrial companies address major OT cybersecurity challenges like lack of resources, ransomware,...
Andreas Walter, IT Security Manager at Audi, combines technical expertise with his passion for cybersecurity. As a tireless guardian of the...
Audi is implementing AI across its factories to guide decision-making and production at scale. What makes Audi's approach to AI stand out is...
With the Audi Global Graduate Program, you'll kick-start your career at an automotive brand headquartered in Germany. Gain deep insights into key business...
In this Data Protection Notice, we are informing you about the processing of your personal data by AUDI AG, Auto-Union-Straße 1, 85045 Ingolstadt (“we”) in...
Already facing significant headwinds, VW has now been hit by a data protection nightmare. Location data from 800000 electric vehicles and...
Let's understand the SWOT analysis of Audi by learning about its strengths, weaknesses, opportunities, and threats.
Volkswagen Group of America Inc., Audi of America LLC, and digital marketer Shift Digital will pay $3.5 million to settle a class action...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of AUDI AG is http://www.audi.com.
According to Rankiteo, AUDI AG’s AI-generated cybersecurity score is 809, reflecting their Good security posture.
According to Rankiteo, AUDI AG currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, AUDI AG is not certified under SOC 2 Type 1.
According to Rankiteo, AUDI AG does not hold a SOC 2 Type 2 certification.
According to Rankiteo, AUDI AG is not listed as GDPR compliant.
According to Rankiteo, AUDI AG does not currently maintain PCI DSS compliance.
According to Rankiteo, AUDI AG is not compliant with HIPAA regulations.
According to Rankiteo,AUDI AG is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
AUDI AG operates primarily in the Motor Vehicle Manufacturing industry.
AUDI AG employs approximately 23,963 people worldwide.
AUDI AG presently has no subsidiaries across any sectors.
AUDI AG’s official LinkedIn profile has approximately 2,037,091 followers.
AUDI AG is classified under the NAICS code 3361, which corresponds to Motor Vehicle Manufacturing.
Yes, AUDI AG has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/audi-ag.
Yes, AUDI AG maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/audi-ag.
As of December 11, 2025, Rankiteo reports that AUDI AG has experienced 7 cybersecurity incidents.
AUDI AG has an estimated 12,645 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions prior to 16.0.96 and 17.0.1 through 17.0.9 have a weak default password. By default, this is a 6 digit numeric value which can be brute forced. (This is the app_password parameter). Depending on local configuration, this password could be the extension, voicemail, user manager, DPMA or EPM phone admin password. This issue is fixed in versions 16.0.96 and 17.0.10.
Neuron is a PHP framework for creating and orchestrating AI Agents. In versions 2.8.11 and below, the MySQLWriteTool executes arbitrary SQL provided by the caller using PDO::prepare() + execute() without semantic restrictions. This is consistent with the name (“write tool”), but in an LLM/agent context it becomes a high-risk capability: prompt injection or indirect prompt manipulation can cause execution of destructive queries such as DROP TABLE, TRUNCATE, DELETE, ALTER, or privilege-related statements (subject to DB permissions). Deployments that expose an agent with MySQLWriteTool enabled to untrusted input and/or run the tool with a DB user that has broad privileges are impacted. This issue is fixed in version 2.8.12.
Neuron is a PHP framework for creating and orchestrating AI Agents. Versions 2.8.11 and below use MySQLSelectTool, which is vulnerable to Read-Only Bypass. MySQLSelectTool is intended to be a read-only SQL tool (e.g., for LLM agent querying, however, validation based on the first keyword (e.g., SELECT) and a forbidden-keyword list does not block file-writing constructs such as INTO OUTFILE / INTO DUMPFILE. As a result, an attacker who can influence the tool input (e.g., via prompt injection through a public agent endpoint) may write arbitrary files to the DB server if the MySQL/MariaDB account has the FILE privilege and server configuration permits writes to a useful location (e.g., a web-accessible directory). This issue is fixed in version 2.8.12.
Okta Java Management SDK facilitates interactions with the Okta management API. In versions 11.0.0 through 20.0.0, race conditions may arise from concurrent requests using the ApiClient class. This could cause a status code or response header from one request’s response to influence another request’s response. This issue is fixed in version 20.0.1.
The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. When using versions 4.11.0 through 4.11.2 and 4.12.0, simultaneous requests on the same client may result in improper lookups in the TokenRequestCache for the request results. This issue is fixed in versions 4.11.2 and 4.12.1.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.