What do we do once we become aware of.
Our dedicated team of experts immediately initiates a comprehensive investigation upon discovering potential vulnerabilities. This involves rigorous testing, analysis, and collaboration across departments to assess the scope and severity of the vulnerability accurately.
Once identified, our team swiftly implements appropriate measures to address and mitigate the identified vulnerabilities. These measures may include patches, updates, or other remediation actions to safeguard our platform and users' data.
Furthermore, we are committed to transparency and accountability in our security practices. As such, we will provide our users with timely updates and notifications regarding any identified vulnerabilities and the corresponding remediation efforts.
Below are Informatica's Responses to recently published 3rd party identified vulnerabilities
Palo Alto Command Injection Impacting PAN-OS- Apl-2024
Leaky Vessels - Jan-2024
Microsoft CrowdStrike - Jul-2024
Spring Framework URL Vulnerability- Mar-2024
Okta Support Incident - Nov-2023
Informatica-Snowflake-Response-Jun-2024
Rapid Reset (DOS) Vulnerability- Oct-2023
Progress Software - MOVEit Vulnerability- Oct-2023
Spring Library - Feb 2025 Major Release Attestation - Oct -2024
Apache Struts-2
Zero-day Vulnerability- Dec-2023
IDMC Credential Leak- Feb-2024
Spring Library - Feb 2025 Major Release CVE Information - Oct -2024
Java ECDSA Vulnerability- May-2022
Geopolitical Ukraine-Russia Conflict- Mar-2022