TELTONIKA NETWORKING DEVICES
Schwachstellenberichte
Jedes Gerät, das mit dem Internet verbunden ist, kann Opfer von Cyberangriffen werden. Hier finden Sie alle Informationen über bestehende oder potenzielle Sicherheitsschwachstellen im Zusammenhang mit unseren Konnektivitätsprodukten.
RutOS and RMS third-party penetration testing
26.3.25
In collaboration with third-party penetration testing service providers, we have undergone rigorous security testing for our RutOS platform based RUTX50 device and Remote Management System. You can learn more about these tests here:
RutOS - https://wiki.teltonika-networks.com/view/RutOS_Declaration_of_Software_Security_2025
RMS - https://wiki.teltonika-networks.com/view/RMS_Declaration_of_Software_Security
RUTX50 ETSI EN 303 645
13.1.25
RUTX50, which is based on our RUTOS firmware, has successfully been certified with the ETSI EN 303 645 security certification. You can learn more about this certificate here: https://wiki.teltonika-networks.com/view/RUTX50_ETSI_EN_303_645
OpenWRT ASU server vulnerability
17.12.24
Vulnerability CVE-2024-54143 affects the openwrt/asu server, which delivers the compiled OpenWRT firmware to the device for easier firmware flashing without requiring opkg. The firmware updates of Teltonika networking devices are delivered via our own FOTA server, which does not incorporate openwrt/asu. As such, Teltonika networking products are not affected by this vulnerability.
Encrypting backups is easier
17.10.24
With the release of RutOS 7.10, you can encrypt your troubleshoot and backup files without downloading additional software from Package Manager. For all files encrypted with earlier versions of RutOS, 7zip package will still be required from Package Manager to decrypt the files.
Title
Beschreibung
Title and description
- Seite 2
NEWS & ARTICLES
Secure Software Development Lifecycle
Ensuring the security of our products and services is a top priority at Teltonika. They are designed, developed, and rigorously tested with security and privacy in mind throughout the software development lifecycle of each release.
In addition to performing vulnerability management, reviewing vulnerability reports, routine monitoring of new vulnerabilities, and handling vulnerability remediation, Teltonika’s core Secure Software Development Lifecycle (SSDL) consists of the following phases:
Training
As a pre-requirement of this lifecycle, Teltonika’s security team drafts training materials and developer test on a yearly basis.
Requirements
Baseline security and privacy requirements for the upcoming release are drafted and communicated internally.
DESIGN
Software design reviews are conducted with the goals of understanding the upcoming release, drafting.
Implementation
Static code scanning tools are maintained and code is reviewed.
Verification
Comprehensive fuzzing, penetration, and final security tests are performed.
Release
Documents are finalised, archived, and taken into account for the following cycle.



