Company Details
china-mobile-international-limited
1,719
175,474
517
chinamobile.com
0
CHI_3628169
In-progress

China Mobile International Limited Company CyberSecurity Posture
chinamobile.comChina Mobile International Limited (CMI) is a wholly-owned subsidiary of China Mobile, mainly responsible for the operation of China Mobile's international business. In order to provide better services to meet the growing demand in the international telecommunications market, China Mobile established a subsidiary, CMI, in December 2010. CMI currently has 90+ terrestrial and submarine cable resources worldwide, with a total international transmission bandwidth of over 150T, and a total of 310 overseas PoPs. With Hong Kong, China as its launchpad, CMI has significantly accelerated global IDC development, creating a strong network for data centre cloudification. Leveraging the strong support by China Mobile, CMI is a trusted partner that provides comprehensive international information services and solutions to international enterprises, carriers and mobile users. Headquartered in Hong Kong, China, CMI has expanded its footprint in 39 countries and regions.
Company Details
china-mobile-international-limited
1,719
175,474
517
chinamobile.com
0
CHI_3628169
In-progress
Between 800 and 849

CMIL Global Score (TPRM)XXXX



No incidents recorded for China Mobile International Limited in 2025.
No incidents recorded for China Mobile International Limited in 2025.
No incidents recorded for China Mobile International Limited in 2025.
CMIL cyber incidents detection timeline including parent company and subsidiaries

China Mobile International Limited (CMI) is a wholly-owned subsidiary of China Mobile, mainly responsible for the operation of China Mobile's international business. In order to provide better services to meet the growing demand in the international telecommunications market, China Mobile established a subsidiary, CMI, in December 2010. CMI currently has 90+ terrestrial and submarine cable resources worldwide, with a total international transmission bandwidth of over 150T, and a total of 310 overseas PoPs. With Hong Kong, China as its launchpad, CMI has significantly accelerated global IDC development, creating a strong network for data centre cloudification. Leveraging the strong support by China Mobile, CMI is a trusted partner that provides comprehensive international information services and solutions to international enterprises, carriers and mobile users. Headquartered in Hong Kong, China, CMI has expanded its footprint in 39 countries and regions.


Reliance Communications Limited, founded by the late Shri Dhirubhai H Ambani (1932-2002), has Corporate clientele that includes 40,000 Indian and multinational corporations, including small and medium enterprises. Reliance Communications has established a pan-India, Next-Generation, digital network

Founded in 2004, OPPO is one of the world's leading innovators of smart devices. With operations in over 60 countries and regions, OPPO's more than 290,000 points of sales and 1,900 official service centers share the beauty of technology with users all over the world. To forward our vision of a bett

Telcel (Radiomóvil Dipsa) es subsidiaria de América Móvil, uno de los mayores proveedores de comunicaciones celulares de Latinoamérica, grupo líder con inversiones en telecomunicaciones en varios países del continente americano. Telcel es la empresa de telefonía celular líder en México. Nuestra s

Idea Cellular is an Aditya Birla Group Company, India's first truly multinational corporation. Idea is a pan-India integrated GSM operator offering 2G and 3G services, and has its own NLD and ILD operations, and ISP license. With revenue in excess of $4 billion; revenue market share of 18%; and subs

Somos una empresa orgullosamente mexicana, líder en tecnología, telecomunicaciones y entretenimiento. Estamos siempre a la vanguardia con el objetivo de llevar a nuestros clientes lo mejor en conectividad, ya sea para que estén cerca de los que más quieren ó puedan alcanzar el éxito profesion
Our adventure began by changing the way people watched TV, bringing DISH to where big cable wouldn’t: rural America. Since then, we have reinvented ourselves and our own industry with Sling TV to give millions of consumers more choice in entertainment. Today, we’ve officially entered the consumer wi

AXIATA GROUP BERHAD 242188-H (199201010685) In pursuit of its vision to be The Next Generation Digital Champion, Axiata is a diversified telecommunications and digital conglomerate operating Digital Telcos, Digital Businesses and Infrastructure businesses across a footprint spanning ASEAN and Sout
Millicom (NASDAQ U.S.: TIGO, Nasdaq) is a leading provider of fixed and mobile telecommunications services in Latin America. Through our TIGO® and Tigo Business® brands, we provide a wide range of digital services and products, including TIGO Money for mobile financial services, TIGO Sports for loca

vivo is a technology company that creates great products based on a design-driven value, with smart devices and intelligent services as its core. The company aims to build a bridge between humans and the digital world. Through unique creativity, vivo provides users with an increasingly convenient mo
.png)
Huawei is a more innovative company today than it was before the U.S. government sought to choke its supply chain. This case should serve as...
UAE-based digital solutions firm Yango Group and China Mobile International (CMI) have reportedly signed a Memorandum of Understanding (MoU)...
DUBAI: Yango Group, a global technology company headquartered in the UAE, and China Mobile International (CMI), a wholly owned subsidiary of...
By Rafiq Vayani. DUBAI: HE Saeed Mohammed Al Tayer, MD and CEO of Dubai Electricity and Water Authority (DEWA), welcomed a high-level...
Kazakhstan has appeared on the global map of China Mobile International (CMI) for the first time, as its Akashi Data Center has been chosen...
An unusually broad coalition composed of the United States, its traditional English-speaking allies and other nations including Germany,...
A security study has unearthed security concerns for travel embedded subscriber identity modules (eSIMs), showing that many providers route...
Maxis revealed on Monday that it is partnering with China Mobile International (CMI) to launch CMLink, its new mobile virtual network...
Nokia Shanghai Bell, a joint venture of Nokia Corp and State-owned investment firm China Huaxin, eyes to be a digital bridge for Chinese companies going global.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of China Mobile International Limited is http://www.cmi.chinamobile.com.
According to Rankiteo, China Mobile International Limited’s AI-generated cybersecurity score is 834, reflecting their Good security posture.
According to Rankiteo, China Mobile International Limited currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, China Mobile International Limited is not certified under SOC 2 Type 1.
According to Rankiteo, China Mobile International Limited does not hold a SOC 2 Type 2 certification.
According to Rankiteo, China Mobile International Limited is not listed as GDPR compliant.
According to Rankiteo, China Mobile International Limited does not currently maintain PCI DSS compliance.
According to Rankiteo, China Mobile International Limited is not compliant with HIPAA regulations.
According to Rankiteo,China Mobile International Limited is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
China Mobile International Limited operates primarily in the Telecommunications industry.
China Mobile International Limited employs approximately 1,719 people worldwide.
China Mobile International Limited presently has no subsidiaries across any sectors.
China Mobile International Limited’s official LinkedIn profile has approximately 175,474 followers.
China Mobile International Limited is classified under the NAICS code 517, which corresponds to Telecommunications.
No, China Mobile International Limited does not have a profile on Crunchbase.
Yes, China Mobile International Limited maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/china-mobile-international-limited.
As of December 11, 2025, Rankiteo reports that China Mobile International Limited has not experienced any cybersecurity incidents.
China Mobile International Limited has an estimated 9,686 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, China Mobile International Limited has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions prior to 16.0.96 and 17.0.1 through 17.0.9 have a weak default password. By default, this is a 6 digit numeric value which can be brute forced. (This is the app_password parameter). Depending on local configuration, this password could be the extension, voicemail, user manager, DPMA or EPM phone admin password. This issue is fixed in versions 16.0.96 and 17.0.10.
Neuron is a PHP framework for creating and orchestrating AI Agents. In versions 2.8.11 and below, the MySQLWriteTool executes arbitrary SQL provided by the caller using PDO::prepare() + execute() without semantic restrictions. This is consistent with the name (“write tool”), but in an LLM/agent context it becomes a high-risk capability: prompt injection or indirect prompt manipulation can cause execution of destructive queries such as DROP TABLE, TRUNCATE, DELETE, ALTER, or privilege-related statements (subject to DB permissions). Deployments that expose an agent with MySQLWriteTool enabled to untrusted input and/or run the tool with a DB user that has broad privileges are impacted. This issue is fixed in version 2.8.12.
Neuron is a PHP framework for creating and orchestrating AI Agents. Versions 2.8.11 and below use MySQLSelectTool, which is vulnerable to Read-Only Bypass. MySQLSelectTool is intended to be a read-only SQL tool (e.g., for LLM agent querying, however, validation based on the first keyword (e.g., SELECT) and a forbidden-keyword list does not block file-writing constructs such as INTO OUTFILE / INTO DUMPFILE. As a result, an attacker who can influence the tool input (e.g., via prompt injection through a public agent endpoint) may write arbitrary files to the DB server if the MySQL/MariaDB account has the FILE privilege and server configuration permits writes to a useful location (e.g., a web-accessible directory). This issue is fixed in version 2.8.12.
Okta Java Management SDK facilitates interactions with the Okta management API. In versions 11.0.0 through 20.0.0, race conditions may arise from concurrent requests using the ApiClient class. This could cause a status code or response header from one request’s response to influence another request’s response. This issue is fixed in version 20.0.1.
The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. When using versions 4.11.0 through 4.11.2 and 4.12.0, simultaneous requests on the same client may result in improper lookups in the TokenRequestCache for the request results. This issue is fixed in versions 4.11.2 and 4.12.1.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
