top of page

TELTONIKA NETWORKING DEVICES

Schwachstellenberichte

Jedes Gerät, das mit dem Internet verbunden ist, kann Opfer von Cyberangriffen werden. Hier finden Sie alle Informationen über bestehende oder potenzielle Sicherheitsschwachstellen im Zusammenhang mit unseren Konnektivitätsprodukten.

RutOS and RMS third-party penetration testing

26.3.25

In collaboration with third-party penetration testing service providers, we have undergone rigorous security testing for our RutOS platform based RUTX50 device and Remote Management System. You can learn more about these tests here:

RutOS - https://wiki.teltonika-networks.com/view/RutOS_Declaration_of_Software_Security_2025

RMS - https://wiki.teltonika-networks.com/view/RMS_Declaration_of_Software_Security

RUTX50 ETSI EN 303 645

13.1.25

RUTX50, which is based on our RUTOS firmware, has successfully been certified with the ETSI EN 303 645 security certification. You can learn more about this certificate here: https://wiki.teltonika-networks.com/view/RUTX50_ETSI_EN_303_645

OpenWRT ASU server vulnerability

17.12.24

Vulnerability CVE-2024-54143 affects the openwrt/asu server, which delivers the compiled OpenWRT firmware to the device for easier firmware flashing without requiring opkg. The firmware updates of Teltonika networking devices are delivered via our own FOTA server, which does not incorporate openwrt/asu. As such, Teltonika networking products are not affected by this vulnerability.

Encrypting backups is easier

17.10.24

With the release of RutOS 7.10, you can encrypt your troubleshoot and backup files without downloading additional software from Package Manager. For all files encrypted with earlier versions of RutOS, 7zip package will still be required from Package Manager to decrypt the files.

Title

Beschreibung

Title and description

  • Seite 2

NEWS & ARTICLES

the-rutx50-5g-router-now-red-certified-article-banner-840xAuto.jpg

2025-06-11 08:55

The RUTX50 5G router – now RED-certified

711530-5g-security-840xAuto.jpg

2024-08-22 13:00

Vulnerability Fix to “5Ghoul” Affecting Teltonika 5G Devices

rms-security-banner-840xAuto.jpg

2024-03-06 15:00

Security Overview of Our Remote Management System

Secure Software Development Lifecycle

Ensuring the security of our products and services is a top priority at Teltonika. They are designed, developed, and rigorously tested with security and privacy in mind throughout the software development lifecycle of each release.

In addition to performing vulnerability management, reviewing vulnerability reports, routine monitoring of new vulnerabilities, and handling vulnerability remediation, Teltonika’s core Secure Software Development Lifecycle (SSDL) consists of the following phases:

Training

As a pre-requirement of this lifecycle, Teltonika’s security team drafts training materials and developer test on a yearly basis.

Requirements

Baseline security and privacy requirements for the upcoming release are drafted and communicated internally.

DESIGN

Software design reviews are conducted with the goals of understanding the upcoming release, drafting.

Implementation

Static code scanning tools are maintained and code is reviewed.

Verification

Comprehensive fuzzing, penetration, and final security tests are performed.

Release

Documents are finalised, archived, and taken into account for the following cycle.

Everything begins with security.

"In an ever-increasing complexity of globally connected digital devices, ensuring cybersecurity is no longer an optional task. The first step should always be keeping your devices up-to date."

fixed-aspect-ratio-spacer-variants.webp
bottom of page