top of page

TELTONIKA NETWORKING DEVICES

Centro De
Seguridad

Cualquier dispositivo conectado a Internet está expuesto a ciberataques. Aquí proporcionamos toda la información sobre cualquier vulnerabilidad de seguridad existente o potencial relacionada con nuestros productos de conectividad.

OpenWRT ASU server vulnerability

17/12/24

Vulnerability CVE-2024-54143 affects the openwrt/asu server, which delivers the compiled OpenWRT firmware to the device for easier firmware flashing without requiring opkg. The firmware updates of Teltonika networking devices are delivered via our own FOTA server, which does not incorporate openwrt/asu. As such, Teltonika networking products are not affected by this vulnerability.

Encrypting backups is easier

17/10/24

With the release of RutOS 7.10, you can encrypt your troubleshoot and backup files without downloading additional software from Package Manager. For all files encrypted with earlier versions of RutOS, 7zip package will still be required from Package Manager to decrypt the files.

xz Utils supply-chain backdoor

3/10/24

The recent open-source supply chain attack against the xz Utils library, liblzma, CVE ID CVE-2024-3094, does not affect any Teltonika Networks products. TSW-series products do not use liblzma and RutOS-based products use an older version of liblzma that is not vulnerable and exists only when used with python and java-vm packages.

5Ghoul vulnerability fix

22/8/24

5G vulnerabilities known as "5Ghoul" have been remediated in our 5G devices: RUTX50, RUTM50, RUTC50, and TRM500. You can update their modem’s firmware by navigating to System, then Firmware, and changing the firmware type to Modem.

Please update your device’s firmware to the firmware version listed below, and ensure you have the RutOS version installed on the device to successfully update its modem firmware.

  • RUTM50: modem firmware version RG520NNADBR03A01M8G_01.002.01.002, RutOS version 7.08.

  • RUTX50: modem firmware RG501QEUAAR12A11M4G_04.200.04.200, RutOS version 7.03.1 or later.

  • RUTC50 and TRM500: modem firmware RG520NEBDCR03A04M4G_01.200.01.200, RutOS version 7.08.

Title

Descripción

Title and description

  • Página 2

NEWS & ARTICLES

the-rutx50-5g-router-now-red-certified-article-banner-840xAuto.jpg

2025-06-11 08:55

Visión General de la Seguridad de Nuestro Sistema de Gestión Remota

711530-5g-security-840xAuto.jpg

2024-08-22 13:00

Nos unimos al programa CVE para mejorar la seguridad de las soluciones de red

rms-security-banner-840xAuto.jpg

2024-03-06 15:00

SECURITY VULNERABILITIES IN RMS AND RUT SERIES DEVICES

Secure Software Development Lifecycle

Ensuring the security of our products and services is a top priority at Teltonika. They are designed, developed, and rigorously tested with security and privacy in mind throughout the software development lifecycle of each release.

In addition to performing vulnerability management, reviewing vulnerability reports, routine monitoring of new vulnerabilities, and handling vulnerability remediation, Teltonika’s core Secure Software Development Lifecycle (SSDL) consists of the following phases:

Training

As a pre-requirement of this lifecycle, Teltonika’s security team drafts training materials and developer test on a yearly basis.

Requirements

Baseline security and privacy requirements for the upcoming release are drafted and communicated internally.

Design

Software design reviews are conducted with the goals of understanding the upcoming release, drafting.

Implementation

Static code scanning tools are maintained and code is reviewed.

Verification

Comprehensive fuzzing, penetration, and final security tests are performed.

Release

Documents are finalised, archived, and taken into account for the following cycle.

Everything begins with security.

"In an ever-increasing complexity of globally connected digital devices, ensuring cybersecurity is no longer an optional task. The first step should always be keeping your devices up-to date."

fixed-aspect-ratio-spacer-variants.webp
bottom of page