TELTONIKA NETWORKING DEVICES
Schwachstellenberichte
Jedes Gerät, das mit dem Internet verbunden ist, kann Opfer von Cyberangriffen werden. Hier finden Sie alle Informationen über bestehende oder potenzielle Sicherheitsschwachstellen im Zusammenhang mit unseren Konnektivitätsprodukten.
2026 RutOS and RMS third-party penetration testing
27.4.26
In collaboration with third-party penetration testing service providers, we have undergone security testing for our RutOS platform based RUTX10 device and Remote Management System. You can learn more about these tests here: RutOS - https://wiki.teltonika-networks.com/view/RUTX10_Device_security
Teltonika Networks has been certified with "IEC 62443-4-1" standard
30.3.26
Teltonika Networks has been certified with the "IEC 62443-4-1:2018 Secure product development lifecycle requirements" standard. You can find the certificate here: https://isasecure.org/end-users/iec-62443-4-1-certified-development-organizations
Teltonika Networks Devices are RED compliant
1.8.25
Teltonika Networks RF capable devices such as RUT, RUTX, RUTM, RUTC, TRB, TAP and OTD are compliant to the latest Radio Equipment Directive Cybersecurity Requirements - Article 3.3 (d), (e). You can find device specific information in our Wiki page, under device certificates, CE/RED.
RUTX50 CE/RED Certification
30.5.25
RUTX50 has successfully achieved the Radio Equipment Directive (RED) harmonized standard certification "EN 18031-1" & "EN 18031-2". For more information please see the following page: https://wiki.teltonika-networks.com/index.php?title=RUTX50_CE/RED
Title
Beschreibung
Title and description
- Seite 1
NEWS & ARTICLES
Secure Software Development Lifecycle
Ensuring the security of our products and services is a top priority at Teltonika. They are designed, developed, and rigorously tested with security and privacy in mind throughout the software development lifecycle of each release.
In addition to performing vulnerability management, reviewing vulnerability reports, routine monitoring of new vulnerabilities, and handling vulnerability remediation, Teltonika’s core Secure Software Development Lifecycle (SSDL) consists of the following phases:
Training
As a pre-requirement of this lifecycle, Teltonika’s security team drafts training materials and developer test on a yearly basis.
Requirements
Baseline security and privacy requirements for the upcoming release are drafted and communicated internally.
DESIGN
Software design reviews are conducted with the goals of understanding the upcoming release, drafting.
Implementation
Static code scanning tools are maintained and code is reviewed.
Verification
Comprehensive fuzzing, penetration, and final security tests are performed.
Release
Documents are finalised, archived, and taken into account for the following cycle.



